Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/582233?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "type": "deb", "namespace": "debian", "name": "firefox-esr", "version": "0", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "45.0esr-1", "latest_non_vulnerable_version": "140.10.0esr-1~deb13u1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63122?format=api", "vulnerability_id": "VCID-15mn-5hnv-w7f4", "summary": "The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape.*Note: this issue only affects Firefox on Windows operating systems.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12389.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12389.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12389", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00554", "scoring_system": "epss", "scoring_elements": "0.68109", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00554", "scoring_system": "epss", "scoring_elements": "0.68077", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00554", "scoring_system": "epss", "scoring_elements": "0.68114", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00554", "scoring_system": "epss", "scoring_elements": "0.68126", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00554", "scoring_system": "epss", "scoring_elements": "0.68014", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00554", "scoring_system": "epss", "scoring_elements": "0.68035", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00554", "scoring_system": "epss", "scoring_elements": "0.68055", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00554", "scoring_system": "epss", "scoring_elements": "0.68033", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00554", "scoring_system": "epss", "scoring_elements": "0.68085", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00554", "scoring_system": "epss", "scoring_elements": "0.68099", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00554", "scoring_system": "epss", "scoring_elements": "0.68124", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00554", "scoring_system": "epss", "scoring_elements": "0.68111", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12389" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831945", "reference_id": "1831945", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831945" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-16", "reference_id": "mfsa2020-16", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-16" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-17", "reference_id": "mfsa2020-17", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-17" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-12389" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-15mn-5hnv-w7f4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51404?format=api", "vulnerability_id": "VCID-19r2-4svk-uydr", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4578.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4578.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4578", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29238", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35912", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35793", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35815", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35823", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35783", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.3576", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.358", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35789", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35882", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35742", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4578" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236077", "reference_id": "2236077", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236077" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-34/", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:09Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-36/", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:09Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-36/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-38/", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:09Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4945", "reference_id": "RHSA-2023:4945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4946", "reference_id": "RHSA-2023:4946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4947", "reference_id": "RHSA-2023:4947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4948", "reference_id": "RHSA-2023:4948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4949", "reference_id": "RHSA-2023:4949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4950", "reference_id": "RHSA-2023:4950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4951", "reference_id": "RHSA-2023:4951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4952", "reference_id": "RHSA-2023:4952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4954", "reference_id": "RHSA-2023:4954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4955", "reference_id": "RHSA-2023:4955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4956", "reference_id": "RHSA-2023:4956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4957", "reference_id": "RHSA-2023:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4958", "reference_id": "RHSA-2023:4958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4959", "reference_id": "RHSA-2023:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5019", "reference_id": "RHSA-2023:5019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5019" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1839007", "reference_id": "show_bug.cgi?id=1839007", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:09Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1839007" }, { "reference_url": "https://usn.ubuntu.com/6320-1/", "reference_id": "USN-6320-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6320-1/" }, { "reference_url": "https://usn.ubuntu.com/6405-1/", "reference_id": "USN-6405-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6405-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922200?format=api", "purl": "pkg:deb/debian/firefox-esr@115.2.0esr-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.2.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-4578" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-19r2-4svk-uydr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51411?format=api", "vulnerability_id": "VCID-1dkk-86db-s3ch", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5168.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5168.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5168", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.4902", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49052", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48984", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49011", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49019", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48965", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49056", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49005", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49032", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49015", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5168" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240892", "reference_id": "2240892", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240892" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-41", "reference_id": "mfsa2023-41", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-41" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-41/", "reference_id": "mfsa2023-41", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:10Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-41/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-42", "reference_id": "mfsa2023-42", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-42" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-42/", "reference_id": "mfsa2023-42", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:10Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-42/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-43", "reference_id": "mfsa2023-43", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-43" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-43/", "reference_id": "mfsa2023-43", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:10Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-43/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846683", "reference_id": "show_bug.cgi?id=1846683", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:10Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846683" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-5168" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1dkk-86db-s3ch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63204?format=api", "vulnerability_id": "VCID-1rj3-tt63-4yc1", "summary": "Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38497.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38497.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-38497", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41657", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41672", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41679", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41604", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41705", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41924", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41831", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41896", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41851", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.419", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41911", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41935", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-38497" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011098", "reference_id": "2011098", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011098" }, { "reference_url": "https://security.archlinux.org/AVG-2443", "reference_id": "AVG-2443", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2443" }, { "reference_url": "https://security.archlinux.org/AVG-2459", "reference_id": "AVG-2459", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2459" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-43", "reference_id": "mfsa2021-43", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-43" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-45", "reference_id": "mfsa2021-45", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-45" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-47", "reference_id": "mfsa2021-47", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-47" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3755", "reference_id": "RHSA-2021:3755", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3755" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3756", "reference_id": "RHSA-2021:3756", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3756" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3757", "reference_id": "RHSA-2021:3757", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3757" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3791", "reference_id": "RHSA-2021:3791", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3791" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3838", "reference_id": "RHSA-2021:3838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3838" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3839", "reference_id": "RHSA-2021:3839", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3839" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3840", "reference_id": "RHSA-2021:3840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3841", "reference_id": "RHSA-2021:3841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3841" }, { "reference_url": "https://usn.ubuntu.com/5107-1/", "reference_id": "USN-5107-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5107-1/" }, { "reference_url": "https://usn.ubuntu.com/5132-1/", "reference_id": "USN-5132-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5132-1/" }, { "reference_url": "https://usn.ubuntu.com/5248-1/", "reference_id": "USN-5248-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5248-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-38497" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1rj3-tt63-4yc1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62678?format=api", "vulnerability_id": "VCID-1ur2-g3su-pqd3", "summary": "A Cliqz.com developer demonstrated that web content could access information in the HTTP cache if e10s is disabled. This can reveal some visited URLs and the contents of those pages. This issue affects Firefox 48 and 49.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5288.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5288.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5288", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00722", "scoring_system": "epss", "scoring_elements": "0.72465", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00722", "scoring_system": "epss", "scoring_elements": "0.72563", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00722", "scoring_system": "epss", "scoring_elements": "0.72538", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00722", "scoring_system": "epss", "scoring_elements": "0.7252", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00722", "scoring_system": "epss", "scoring_elements": "0.72511", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00722", "scoring_system": "epss", "scoring_elements": "0.72553", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00722", "scoring_system": "epss", "scoring_elements": "0.7247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00722", "scoring_system": "epss", "scoring_elements": "0.72488", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00722", "scoring_system": "epss", "scoring_elements": "0.72464", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00722", "scoring_system": "epss", "scoring_elements": "0.72502", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00722", "scoring_system": "epss", "scoring_elements": "0.72515", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5288" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1310183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1310183" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-87/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-87/" }, { "reference_url": "http://www.securityfocus.com/bid/93810", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/93810" }, { "reference_url": "http://www.securitytracker.com/id/1037077", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037077" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387588", "reference_id": "1387588", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387588" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5288", "reference_id": "CVE-2016-5288", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5288" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-87", "reference_id": "mfsa2016-87", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-87" }, { "reference_url": "https://usn.ubuntu.com/3111-1/", "reference_id": "USN-3111-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3111-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5288" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1ur2-g3su-pqd3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56647?format=api", "vulnerability_id": "VCID-1w8j-w2rh-hqdf", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2809.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2809.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2809", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.60067", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.59911", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.60053", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.60036", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.60075", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.60081", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.59988", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.60013", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.59984", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.60034", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.60047", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.60068", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2809" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1212939", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1212939" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:P/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-40.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-40.html" }, { "reference_url": "http://www.securitytracker.com/id/1035692", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035692" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330272", "reference_id": "1330272", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330272" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2809", "reference_id": "CVE-2016-2809", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2809" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2809", "reference_id": "CVE-2016-2809", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2809" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-40", "reference_id": "mfsa2016-40", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-40" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2809" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1w8j-w2rh-hqdf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63093?format=api", "vulnerability_id": "VCID-2a5d-8cac-mkft", "summary": "A newline in a filename could have been used to bypass the file extension security mechanisms that replace malicious file extensions such as .lnk with .download. This could have led to accidental execution of malicious code.*This bug only affects Firefox on Windows. Other versions of Firefox are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29542.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29542.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29542", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28885", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.29026", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28999", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28995", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28953", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.29076", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31898", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31864", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.3315", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33127", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33089", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29542" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186107", "reference_id": "2186107", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186107" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-13", "reference_id": "mfsa2023-13", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-13" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-13/", "reference_id": "mfsa2023-13", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-11T15:45:52Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-13/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-14", "reference_id": "mfsa2023-14", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-14" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-14/", "reference_id": "mfsa2023-14", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-11T15:45:52Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-14/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-15", "reference_id": "mfsa2023-15", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-15" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-15/", "reference_id": "mfsa2023-15", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-11T15:45:52Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-15/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1810793", "reference_id": "show_bug.cgi?id=1810793", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-11T15:45:52Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1810793" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1815062", "reference_id": "show_bug.cgi?id=1815062", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-11T15:45:52Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1815062" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-29542" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2a5d-8cac-mkft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63472?format=api", "vulnerability_id": "VCID-2w58-mdmk-guh8", "summary": "Mozilla has updated the version of Network Security Services\n(NSS) library used in Firefox to NSS 3.23. This addresses four moderate rated\nnetworking security issues reported by Mozilla engineers Tyson Smith and\nJed Davis.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2779.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2779.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2834.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2834.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2834", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60676", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60515", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60663", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60642", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60685", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60691", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.6059", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60619", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60589", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60638", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60653", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60678", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2834" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1206283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1206283" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221620" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1241034", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1241034" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1241037", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1241037" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950" }, { "reference_url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes", "reference_id": "", "reference_type": "", "scores": [], "url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3688", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3688" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-61.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-61.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "reference_url": "http://www.securityfocus.com/bid/91072", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/91072" }, { "reference_url": "http://www.securitytracker.com/id/1036057", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036057" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2993-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2993-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3029-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3029-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347908", "reference_id": "1347908", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347908" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2834", "reference_id": "CVE-2016-2834", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2834" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2834", "reference_id": "CVE-2016-2834", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2834" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-61", "reference_id": "mfsa2016-61", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-61" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2779", "reference_id": "RHSA-2016:2779", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2779" }, { "reference_url": "https://usn.ubuntu.com/2993-1/", "reference_id": "USN-2993-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2993-1/" }, { "reference_url": "https://usn.ubuntu.com/3029-1/", "reference_id": "USN-3029-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3029-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2834" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2w58-mdmk-guh8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63158?format=api", "vulnerability_id": "VCID-2xtz-k8nq-n3hf", "summary": "A malicious Android application could craft an Intent that would have been processed by Firefox for Android and potentially result in a file overwrite in the user's profile directory. One exploitation vector for this would be to supply a user.js file providing arbitrary malicious preference values. Control of arbitrary preferences can lead to sufficient compromise such that it is generally equivalent to arbitrary code execution. *Note: This issue only affects Firefox for Android. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6828.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6828.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6828", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57724", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57838", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57862", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57861", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57808", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57828", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57803", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57858", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57859", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57876", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57854", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57833", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6828" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821967", "reference_id": "1821967", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821967" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-13", "reference_id": "mfsa2020-13", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-13" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-6828" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2xtz-k8nq-n3hf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63343?format=api", "vulnerability_id": "VCID-2z7p-2uj3-2qfb", "summary": "If hyperthreading is not disabled, a timing attack vulnerability exists, similar to previous Spectre attacks. Apple has shipped macOS 10.14.5 with an option to disable hyperthreading in applications running untrusted code in a thread through a new sysctl. Firefox now makes use of it on the main thread and any worker threads. *Note: users need to update to macOS 10.14.5 in order to take advantage of this change.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9815.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9815.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9815", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.77257", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.77224", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.77263", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.77265", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.77162", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.77169", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.77198", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.77179", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.77212", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.7722", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.77248", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.77227", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9815" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712624", "reference_id": "1712624", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712624" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-13", "reference_id": "mfsa2019-13", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-14", "reference_id": "mfsa2019-14", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-15", "reference_id": "mfsa2019-15", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-9815" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2z7p-2uj3-2qfb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48161?format=api", "vulnerability_id": "VCID-3465-gq22-3kfy", "summary": "Multiple vulnerabilities have been found in Expat, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "reference_url": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2824.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2824.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0718.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0718.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0718", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02827", "scoring_system": "epss", "scoring_elements": "0.86184", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02827", "scoring_system": "epss", "scoring_elements": "0.86105", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02827", "scoring_system": "epss", "scoring_elements": "0.86174", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02827", "scoring_system": "epss", "scoring_elements": "0.8617", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02827", "scoring_system": "epss", "scoring_elements": "0.86187", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02827", "scoring_system": "epss", "scoring_elements": "0.86193", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02827", "scoring_system": "epss", "scoring_elements": "0.86115", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02827", "scoring_system": "epss", "scoring_elements": "0.86132", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02827", "scoring_system": "epss", "scoring_elements": "0.86131", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02827", "scoring_system": "epss", "scoring_elements": "0.8615", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02827", "scoring_system": "epss", "scoring_elements": "0.86162", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02827", "scoring_system": "epss", "scoring_elements": "0.86176", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0718" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472" }, { "reference_url": "http://seclists.org/fulldisclosure/2017/Feb/68", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2017/Feb/68" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365" }, { "reference_url": "https://source.android.com/security/bulletin/2016-11-01.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "reference_url": "https://support.apple.com/HT206903", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT206903" }, { "reference_url": "http://support.eset.com/ca6333/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.eset.com/ca6333/" }, { "reference_url": "https://www.tenable.com/security/tns-2016-20", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2016-20" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3582", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3582" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/05/17/12", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/05/17/12" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "reference_url": "http://www.securityfocus.com/bid/90729", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/90729" }, { "reference_url": "http://www.securitytracker.com/id/1036348", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036348" }, { "reference_url": "http://www.securitytracker.com/id/1036415", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036415" }, { "reference_url": "http://www.securitytracker.com/id/1037705", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037705" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2983-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2983-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3044-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3044-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102", "reference_id": "1296102", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718", "reference_id": "CVE-2016-0718", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0718", "reference_id": "CVE-2016-0718", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0718" }, { "reference_url": "https://security.gentoo.org/glsa/201701-21", "reference_id": "GLSA-201701-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-21" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-68", "reference_id": "mfsa2016-68", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-68" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2824", "reference_id": "RHSA-2016:2824", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2824" }, { "reference_url": "https://usn.ubuntu.com/2983-1/", "reference_id": "USN-2983-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2983-1/" }, { "reference_url": "https://usn.ubuntu.com/3013-1/", "reference_id": "USN-3013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3013-1/" }, { "reference_url": "https://usn.ubuntu.com/3044-1/", "reference_id": "USN-3044-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3044-1/" }, { "reference_url": "https://usn.ubuntu.com/7199-1/", "reference_id": "USN-7199-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7199-1/" }, { "reference_url": "https://usn.ubuntu.com/USN-5455-1/", "reference_id": "USN-USN-5455-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-5455-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-0718" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3465-gq22-3kfy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63164?format=api", "vulnerability_id": "VCID-44zf-meps-6fey", "summary": "Given an installed malicious file picker application, an attacker was able to overwrite local files and thus overwrite Firefox settings (but not access the previous profile).\n*Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15650.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15650.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15650", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.47993", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48031", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48052", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48001", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48054", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48048", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48072", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48049", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.4806", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48112", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48108", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48063", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15650" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870410", "reference_id": "1870410", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870410" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-31", "reference_id": "mfsa2020-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-31" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-15650" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-44zf-meps-6fey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62659?format=api", "vulnerability_id": "VCID-47dr-szw4-ryfr", "summary": "During URL parsing, a maliciously crafted URL can cause a potentially exploitable crash.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5292.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5292.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5292", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.74956", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.75032", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.75031", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.7501", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.74999", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.75035", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.75043", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.74959", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.74988", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.74963", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.74997", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.75009", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5292" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1288482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1288482" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-89/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-89/" }, { "reference_url": "http://www.securityfocus.com/bid/94337", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94337" }, { "reference_url": "http://www.securitytracker.com/id/1037298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037298" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395057", "reference_id": "1395057", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395057" }, { "reference_url": "https://security.archlinux.org/ASA-201611-16", "reference_id": "ASA-201611-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-16" }, { "reference_url": "https://security.archlinux.org/AVG-72", "reference_id": "AVG-72", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-72" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5292", "reference_id": "CVE-2016-5292", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5292" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89", "reference_id": "mfsa2016-89", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89" }, { "reference_url": "https://usn.ubuntu.com/3124-1/", "reference_id": "USN-3124-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3124-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5292" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-47dr-szw4-ryfr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51226?format=api", "vulnerability_id": "VCID-4c3c-ygt3-kbg5", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6797.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6797.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6797", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.77253", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.77224", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.7722", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.7726", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.77262", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.77159", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.77165", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.77195", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.77176", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.77209", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.77217", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0102", "scoring_system": "epss", "scoring_elements": "0.77245", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6797" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801917", "reference_id": "1801917", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801917" }, { "reference_url": "https://security.gentoo.org/glsa/202003-02", "reference_id": "GLSA-202003-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-05", "reference_id": "mfsa2020-05", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-05" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-06", "reference_id": "mfsa2020-06", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-06" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-07", "reference_id": "mfsa2020-07", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-07" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-6797" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4c3c-ygt3-kbg5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62705?format=api", "vulnerability_id": "VCID-4r8e-64b6-bbbu", "summary": "Use-after-free in the Widget: Cocoa component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4711.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4711.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-4711", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06224", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06078", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06047", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06117", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06126", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06087", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06062", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06027", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06067", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06105", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06112", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-4711" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450733", "reference_id": "2450733", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450733" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-20", "reference_id": "mfsa2026-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-20" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-20/", "reference_id": "mfsa2026-20", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-25T16:25:02Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2026-20/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-22", "reference_id": "mfsa2026-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-22" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-22/", "reference_id": "mfsa2026-22", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-25T16:25:02Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-23", "reference_id": "mfsa2026-23", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-23" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-23/", "reference_id": "mfsa2026-23", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-25T16:25:02Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2026-23/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-24", "reference_id": "mfsa2026-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-24/", "reference_id": "mfsa2026-24", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-25T16:25:02Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5930", "reference_id": "RHSA-2026:5930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5931", "reference_id": "RHSA-2026:5931", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5931" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5932", "reference_id": "RHSA-2026:5932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5932" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6188", "reference_id": "RHSA-2026:6188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6342", "reference_id": "RHSA-2026:6342", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6342" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6917", "reference_id": "RHSA-2026:6917", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6917" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7837", "reference_id": "RHSA-2026:7837", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7838", "reference_id": "RHSA-2026:7838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7838" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7839", "reference_id": "RHSA-2026:7839", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7839" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7840", "reference_id": "RHSA-2026:7840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7841", "reference_id": "RHSA-2026:7841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7841" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7842", "reference_id": "RHSA-2026:7842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7843", "reference_id": "RHSA-2026:7843", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7843" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7845", "reference_id": "RHSA-2026:7845", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7845" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7858", "reference_id": "RHSA-2026:7858", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7858" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8284", "reference_id": "RHSA-2026:8284", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8284" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8285", "reference_id": "RHSA-2026:8285", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8285" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8286", "reference_id": "RHSA-2026:8286", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8286" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8287", "reference_id": "RHSA-2026:8287", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8287" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8288", "reference_id": "RHSA-2026:8288", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8288" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8289", "reference_id": "RHSA-2026:8289", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8289" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8290", "reference_id": "RHSA-2026:8290", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8290" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8315", "reference_id": "RHSA-2026:8315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8315" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8427", "reference_id": "RHSA-2026:8427", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8427" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8850", "reference_id": "RHSA-2026:8850", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8850" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2017002", "reference_id": "show_bug.cgi?id=2017002", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-25T16:25:02Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2017002" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2026-4711" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4r8e-64b6-bbbu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62882?format=api", "vulnerability_id": "VCID-4rpa-nwnh-b3h3", "summary": "The Mozilla Windows updater modifies some files to be updated by reading the original file and applying changes to it. The location of the original file can be altered by a malicious user by passing a special path to the callback parameter through the Mozilla Maintenance Service, allowing the manipulation of files in the installation directory and privilege escalation by manipulating the Mozilla Maintenance Service, which has privileged access. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7760", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.3385", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33882", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33858", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33896", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33881", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33621", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33965", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33997", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33851", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33893", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33925", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33924", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7760" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1348645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1348645" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-15/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-15/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-16/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-16/" }, { "reference_url": "http://www.securityfocus.com/bid/99057", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/99057" }, { "reference_url": "http://www.securitytracker.com/id/1038689", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1038689" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7760", "reference_id": "CVE-2017-7760", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7760" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-15", "reference_id": "mfsa2017-15", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-16", "reference_id": "mfsa2017-16", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-7760" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4rpa-nwnh-b3h3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63338?format=api", "vulnerability_id": "VCID-4sv2-j8zg-xkhf", "summary": "When running, the updater service wrote status and log files to an unrestricted location; potentially allowing an unprivileged process to locate and exploit a vulnerability in file handling in the updater service. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17009.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17009.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17009", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34687", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.3477", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34731", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34708", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34742", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34727", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34579", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34792", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34818", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34695", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34738", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34766", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17009" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779433", "reference_id": "1779433", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779433" }, { "reference_url": "https://security.archlinux.org/ASA-201912-1", "reference_id": "ASA-201912-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201912-1" }, { "reference_url": "https://security.archlinux.org/AVG-1071", "reference_id": "AVG-1071", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1071" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-36", "reference_id": "mfsa2019-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-36" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-37", "reference_id": "mfsa2019-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-37" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-38", "reference_id": "mfsa2019-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-38" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-17009" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4sv2-j8zg-xkhf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62610?format=api", "vulnerability_id": "VCID-4vps-3cxv-xyd5", "summary": "On Windows 10, when using the 'Save As' functionality, an attacker could have tricked the browser into saving the file with a disallowed extension such as .url by including an invalid character in the extension. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5692.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5692.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5692", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54726", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54742", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54745", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61521", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61475", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61503", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61473", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61536", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61524", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61544", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61557", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5692" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291398", "reference_id": "2291398", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291398" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-25", "reference_id": "mfsa2024-25", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-25" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-25/", "reference_id": "mfsa2024-25", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:09Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-25/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-26", "reference_id": "mfsa2024-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-26" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", "reference_id": "mfsa2024-26", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:09Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-28", "reference_id": "mfsa2024-28", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-28" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", "reference_id": "mfsa2024-28", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:09Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1891234", "reference_id": "show_bug.cgi?id=1891234", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:09Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1891234" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-5692" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4vps-3cxv-xyd5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62903?format=api", "vulnerability_id": "VCID-4z19-eyh7-9yf4", "summary": "The existence of a specifically requested local file can be found due to the double firing of the onerror when the source attribute on a <track> tag refers to a file that does not exist if the source page is loaded locally.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5387", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31882", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31895", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31971", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31931", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31897", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.3191", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.32022", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.32063", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31886", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31938", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31967", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5387" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1295023", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1295023" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-01/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-01/" }, { "reference_url": "http://www.securityfocus.com/bid/95763", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/95763" }, { "reference_url": "http://www.securitytracker.com/id/1037693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037693" }, { "reference_url": "https://security.archlinux.org/ASA-201701-39", "reference_id": "ASA-201701-39", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-39" }, { "reference_url": "https://security.archlinux.org/AVG-157", "reference_id": "AVG-157", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-157" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5387", "reference_id": "CVE-2017-5387", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5387" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01", "reference_id": "mfsa2017-01", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01" }, { "reference_url": "https://usn.ubuntu.com/3175-1/", "reference_id": "USN-3175-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3175-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-5387" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4z19-eyh7-9yf4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63119?format=api", "vulnerability_id": "VCID-5666-pp89-aqc2", "summary": "The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution.*Note: this issue only affects Firefox on Windows operating systems.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12393.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12393.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12393", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65113", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65084", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.6512", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65129", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65001", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65051", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65077", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.6504", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.6509", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65103", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65122", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65112", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12393" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831946", "reference_id": "1831946", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831946" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-16", "reference_id": "mfsa2020-16", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-16" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-17", "reference_id": "mfsa2020-17", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-17" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-18", "reference_id": "mfsa2020-18", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-18" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-12393" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5666-pp89-aqc2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63211?format=api", "vulnerability_id": "VCID-5aga-y5nk-5fha", "summary": "A locally-installed hostile program could send `WM_COPYDATA` messages that Firefox would processing incorrectly, leading to an out-of-bounds read.\n*This bug only affects Firefox on Windows. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29964.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29964.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29964", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55481", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.5548", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55463", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55499", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55502", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55326", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55437", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55461", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.5544", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55501", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29964" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966830", "reference_id": "1966830", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966830" }, { "reference_url": "https://security.archlinux.org/AVG-2019", "reference_id": "AVG-2019", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2019" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-23", "reference_id": "mfsa2021-23", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-23" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-24", "reference_id": "mfsa2021-24", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-24" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-26", "reference_id": "mfsa2021-26", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-29964" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5aga-y5nk-5fha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61818?format=api", "vulnerability_id": "VCID-5c1p-6gjw-wkgx", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird,\n the worst of which could lead to the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12391.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12391.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12391", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.679", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67882", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67895", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67919", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67906", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67869", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67918", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67798", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67832", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67851", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67831", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12391" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1478843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1478843" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2018-26/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2018-26/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2018-27/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2018-27/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2018-28/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2018-28/" }, { "reference_url": "http://www.securityfocus.com/bid/105718", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/105718" }, { "reference_url": "http://www.securityfocus.com/bid/105769", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/105769" }, { "reference_url": "http://www.securitytracker.com/id/1041944", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041944" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642181", "reference_id": "1642181", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642181" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12391", "reference_id": "CVE-2018-12391", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12391" }, { "reference_url": "https://security.gentoo.org/glsa/201811-13", "reference_id": "GLSA-201811-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-26", "reference_id": "mfsa2018-26", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-27", "reference_id": "mfsa2018-27", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-27" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-28", "reference_id": "mfsa2018-28", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-28" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-12391" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5c1p-6gjw-wkgx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62880?format=api", "vulnerability_id": "VCID-5p2x-6brd-xfad", "summary": "Default fonts on OS X display some Tibetan characters as whitespace. When used in the addressbar as part of an IDN this can be used for domain name spoofing attacks. *Note: This attack only affects OS X operating systems. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7763", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66384", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66392", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66378", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66348", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66383", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66399", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66274", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66313", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.6634", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.6631", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66358", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66372", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7763" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1360309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1360309" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-15/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-15/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-16/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-16/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-17/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-17/" }, { "reference_url": "http://www.securityfocus.com/bid/99057", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/99057" }, { "reference_url": "http://www.securitytracker.com/id/1038689", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1038689" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7763", "reference_id": "CVE-2017-7763", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7763" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-15", "reference_id": "mfsa2017-15", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-16", "reference_id": "mfsa2017-16", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-16" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-17", "reference_id": "mfsa2017-17", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-17" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-7763" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5p2x-6brd-xfad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62878?format=api", "vulnerability_id": "VCID-5srb-q1nd-1qfh", "summary": "A buffer overflow occurs when drawing and validating elements using Direct 3D 9 with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash. *Note: This attack only affects Windows operating systems. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7845", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00763", "scoring_system": "epss", "scoring_elements": "0.73447", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00763", "scoring_system": "epss", "scoring_elements": "0.73431", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00763", "scoring_system": "epss", "scoring_elements": "0.7341", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00763", "scoring_system": "epss", "scoring_elements": "0.73403", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00763", "scoring_system": "epss", "scoring_elements": "0.73445", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00763", "scoring_system": "epss", "scoring_elements": "0.73453", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00763", "scoring_system": "epss", "scoring_elements": "0.73352", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00763", "scoring_system": "epss", "scoring_elements": "0.73362", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00763", "scoring_system": "epss", "scoring_elements": "0.73386", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00763", "scoring_system": "epss", "scoring_elements": "0.73357", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00763", "scoring_system": "epss", "scoring_elements": "0.73394", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00763", "scoring_system": "epss", "scoring_elements": "0.73407", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7845" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1402372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1402372" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-28/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-28/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-29/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-29/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-30/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-30/" }, { "reference_url": "http://www.securityfocus.com/bid/102115", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/102115" }, { "reference_url": "http://www.securitytracker.com/id/1040123", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1040123" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7845", "reference_id": "CVE-2017-7845", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7845" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-28", "reference_id": "mfsa2017-28", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-28" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-29", "reference_id": "mfsa2017-29", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-29" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-30", "reference_id": "mfsa2017-30", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-30" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-7845" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5srb-q1nd-1qfh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63354?format=api", "vulnerability_id": "VCID-5zmj-5xkc-zkgc", "summary": "A vulnerability exists in the Windows sandbox where an uninitialized value in memory can be leaked to a renderer from a broker when making a call to access an otherwise unavailable file. This results in the potential leaking of information stored at that memory location. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11694.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11694.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11694", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60616", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60603", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60582", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60623", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60628", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60458", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60534", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.6056", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60529", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60578", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60594", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60618", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11694" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712620", "reference_id": "1712620", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712620" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-13", "reference_id": "mfsa2019-13", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-14", "reference_id": "mfsa2019-14", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-15", "reference_id": "mfsa2019-15", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-11694" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5zmj-5xkc-zkgc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62664?format=api", "vulnerability_id": "VCID-6cde-35h4-vqaj", "summary": "An issue where WebExtensions can use the mozAddonManager API to elevate privilege due to privileged pages being allowed in the permissions list. This allows a malicious extension to then install additional extensions without explicit user permission.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9075.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9075.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9075", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02551", "scoring_system": "epss", "scoring_elements": "0.85417", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02551", "scoring_system": "epss", "scoring_elements": "0.85515", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02551", "scoring_system": "epss", "scoring_elements": "0.85495", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02551", "scoring_system": "epss", "scoring_elements": "0.85493", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02551", "scoring_system": "epss", "scoring_elements": "0.8549", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02551", "scoring_system": "epss", "scoring_elements": "0.85513", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02551", "scoring_system": "epss", "scoring_elements": "0.85518", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02551", "scoring_system": "epss", "scoring_elements": "0.85429", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02551", "scoring_system": "epss", "scoring_elements": "0.85449", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02551", "scoring_system": "epss", "scoring_elements": "0.85452", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02551", "scoring_system": "epss", "scoring_elements": "0.85472", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02551", "scoring_system": "epss", "scoring_elements": "0.85481", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9075" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1295324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1295324" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:S/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-89/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-89/" }, { "reference_url": "http://www.securityfocus.com/bid/94337", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94337" }, { "reference_url": "http://www.securitytracker.com/id/1037298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037298" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395101", "reference_id": "1395101", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395101" }, { "reference_url": "https://security.archlinux.org/ASA-201611-16", "reference_id": "ASA-201611-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-16" }, { "reference_url": "https://security.archlinux.org/AVG-72", "reference_id": "AVG-72", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-72" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9075", "reference_id": "CVE-2016-9075", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9075" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89", "reference_id": "mfsa2016-89", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89" }, { "reference_url": "https://usn.ubuntu.com/3124-1/", "reference_id": "USN-3124-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3124-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9075" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6cde-35h4-vqaj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62840?format=api", "vulnerability_id": "VCID-6p3q-f7f6-mygv", "summary": "Mozilla developers and community members Christian Holler, Jon Coppeard, Milan Sreckovic, Tyson Smith, Ronald Crane, Randell Jesup, Philipp, Tooru Fujisawa, and Kan-Ru Chen reported memory safety bugs present in Firefox 52 and Firefox ESR 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5430.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5430.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5430", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00746", "scoring_system": "epss", "scoring_elements": "0.73103", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00746", "scoring_system": "epss", "scoring_elements": "0.73047", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00746", "scoring_system": "epss", "scoring_elements": "0.7306", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00746", "scoring_system": "epss", "scoring_elements": "0.73084", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00746", "scoring_system": "epss", "scoring_elements": "0.73064", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00746", "scoring_system": "epss", "scoring_elements": "0.73057", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00746", "scoring_system": "epss", "scoring_elements": "0.731", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00746", "scoring_system": "epss", "scoring_elements": "0.7311", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00746", "scoring_system": "epss", "scoring_elements": "0.73004", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00746", "scoring_system": "epss", "scoring_elements": "0.73014", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00746", "scoring_system": "epss", "scoring_elements": "0.73035", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00746", "scoring_system": "epss", "scoring_elements": "0.7301", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5430" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1342101%2C1340482%2C1344686%2C1329796%2C1346419%2C1349621%2C1344081%2C1344305%2C1348143%2C1349719%2C1353476%2C1337418%2C1346140%2C1339722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1342101%2C1340482%2C1344686%2C1329796%2C1346419%2C1349621%2C1344081%2C1344305%2C1348143%2C1349719%2C1353476%2C1337418%2C1346140%2C1339722" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-10/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-10/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-12/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-12/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-13/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-13/" }, { "reference_url": "http://www.securityfocus.com/bid/97940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/97940" }, { "reference_url": "http://www.securitytracker.com/id/1038320", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1038320" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443331", "reference_id": "1443331", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443331" }, { "reference_url": "https://security.archlinux.org/ASA-201704-6", "reference_id": "ASA-201704-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201704-6" }, { "reference_url": "https://security.archlinux.org/AVG-249", "reference_id": "AVG-249", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-249" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5430", "reference_id": "CVE-2017-5430", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5430" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-10", "reference_id": "mfsa2017-10", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-12", "reference_id": "mfsa2017-12", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-12" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-13", "reference_id": "mfsa2017-13", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-13" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1106", "reference_id": "RHSA-2017:1106", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1106" }, { "reference_url": "https://usn.ubuntu.com/3260-1/", "reference_id": "USN-3260-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3260-1/" }, { "reference_url": "https://usn.ubuntu.com/3278-1/", "reference_id": "USN-3278-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3278-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-5430" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6p3q-f7f6-mygv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62674?format=api", "vulnerability_id": "VCID-6pk2-g77j-h3b2", "summary": "An integer overflow during the parsing of XML using the Expat library.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9063.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9063.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9063", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02427", "scoring_system": "epss", "scoring_elements": "0.85074", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02427", "scoring_system": "epss", "scoring_elements": "0.85165", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02427", "scoring_system": "epss", "scoring_elements": "0.85108", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02427", "scoring_system": "epss", "scoring_elements": "0.85129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02427", "scoring_system": "epss", "scoring_elements": "0.85136", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02427", "scoring_system": "epss", "scoring_elements": "0.85151", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02427", "scoring_system": "epss", "scoring_elements": "0.85148", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02427", "scoring_system": "epss", "scoring_elements": "0.85145", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02427", "scoring_system": "epss", "scoring_elements": "0.85166", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02427", "scoring_system": "epss", "scoring_elements": "0.85167", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02427", "scoring_system": "epss", "scoring_elements": "0.85086", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02427", "scoring_system": "epss", "scoring_elements": "0.85104", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9063" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1274777", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1274777" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9063", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9063" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.debian.org/security/2017/dsa-3898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2017/dsa-3898" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-89/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-89/" }, { "reference_url": "http://www.securityfocus.com/bid/94337", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94337" }, { "reference_url": "http://www.securitytracker.com/id/1037298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037298" }, { "reference_url": "http://www.securitytracker.com/id/1039427", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1039427" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396540", "reference_id": "1396540", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396540" }, { "reference_url": "https://security.archlinux.org/ASA-201611-16", "reference_id": "ASA-201611-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-16" }, { "reference_url": "https://security.archlinux.org/ASA-201706-32", "reference_id": "ASA-201706-32", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201706-32" }, { "reference_url": "https://security.archlinux.org/ASA-201707-27", "reference_id": "ASA-201707-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201707-27" }, { "reference_url": "https://security.archlinux.org/AVG-305", "reference_id": "AVG-305", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-305" }, { "reference_url": "https://security.archlinux.org/AVG-306", "reference_id": "AVG-306", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-306" }, { "reference_url": "https://security.archlinux.org/AVG-72", "reference_id": "AVG-72", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-72" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9063", "reference_id": "CVE-2016-9063", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9063" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89", "reference_id": "mfsa2016-89", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89" }, { "reference_url": "https://usn.ubuntu.com/3124-1/", "reference_id": "USN-3124-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3124-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9063" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6pk2-g77j-h3b2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62879?format=api", "vulnerability_id": "VCID-6rpt-16pv-yfar", "summary": "The Firefox installer on Windows can be made to load malicious DLL files stored in the same directory as the installer when it is run. This allows privileged execution if the installer is run with elevated privileges. *Note: This attack only affects Windows operating systems. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7755", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73477", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.7346", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.7344", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73432", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73475", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73484", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73383", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73391", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73414", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73386", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73423", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73437", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7755" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1361326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1361326" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-15/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-15/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-16/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-16/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-17/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-17/" }, { "reference_url": "http://www.securityfocus.com/bid/99057", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/99057" }, { "reference_url": "http://www.securitytracker.com/id/1038689", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1038689" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7755", "reference_id": "CVE-2017-7755", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7755" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-15", "reference_id": "mfsa2017-15", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-16", "reference_id": "mfsa2017-16", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-16" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-17", "reference_id": "mfsa2017-17", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-17" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-7755" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6rpt-16pv-yfar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51410?format=api", "vulnerability_id": "VCID-6s88-vfr8-u3hj", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4585.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4585.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4585", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00191", "scoring_system": "epss", "scoring_elements": "0.41096", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00191", "scoring_system": "epss", "scoring_elements": "0.41081", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00191", "scoring_system": "epss", "scoring_elements": "0.41115", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00191", "scoring_system": "epss", "scoring_elements": "0.41113", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00191", "scoring_system": "epss", "scoring_elements": "0.4104", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00191", "scoring_system": "epss", "scoring_elements": "0.41089", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00191", "scoring_system": "epss", "scoring_elements": "0.41082", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00191", "scoring_system": "epss", "scoring_elements": "0.41078", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00191", "scoring_system": "epss", "scoring_elements": "0.41107", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00191", "scoring_system": "epss", "scoring_elements": "0.41065", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42393", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4585" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236086", "reference_id": "2236086", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236086" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1751583%2C1841082%2C1847904%2C1848999", "reference_id": "buglist.cgi?bug_id=1751583%2C1841082%2C1847904%2C1848999", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T19:08:38Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1751583%2C1841082%2C1847904%2C1848999" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-34/", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T19:08:38Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-36/", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T19:08:38Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-36/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-38/", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T19:08:38Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4945", "reference_id": "RHSA-2023:4945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4946", "reference_id": "RHSA-2023:4946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4947", "reference_id": "RHSA-2023:4947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4948", "reference_id": "RHSA-2023:4948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4949", "reference_id": "RHSA-2023:4949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4950", "reference_id": "RHSA-2023:4950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4951", "reference_id": "RHSA-2023:4951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4952", "reference_id": "RHSA-2023:4952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4954", "reference_id": "RHSA-2023:4954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4955", "reference_id": "RHSA-2023:4955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4956", "reference_id": "RHSA-2023:4956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4957", "reference_id": "RHSA-2023:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4958", "reference_id": "RHSA-2023:4958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4959", "reference_id": "RHSA-2023:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5019", "reference_id": "RHSA-2023:5019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5019" }, { "reference_url": "https://usn.ubuntu.com/6320-1/", "reference_id": "USN-6320-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6320-1/" }, { "reference_url": "https://usn.ubuntu.com/6405-1/", "reference_id": "USN-6405-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6405-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922200?format=api", "purl": "pkg:deb/debian/firefox-esr@115.2.0esr-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.2.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-4585" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6s88-vfr8-u3hj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60717?format=api", "vulnerability_id": "VCID-6uth-8k3d-7qdj", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12381.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12381.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12381", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.7053", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70479", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70522", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70415", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70429", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70446", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70424", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70469", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70485", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70509", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70494", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12381" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625529", "reference_id": "1625529", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625529" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-20", "reference_id": "mfsa2018-20", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-20" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-21", "reference_id": "mfsa2018-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-21" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-12381" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6uth-8k3d-7qdj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51414?format=api", "vulnerability_id": "VCID-6zjy-1agk-nbd9", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5174.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5174.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5174", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63452", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63466", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63397", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63458", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.6346", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63476", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.6339", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63441", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63424", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63459", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5174" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240895", "reference_id": "2240895", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240895" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-41", "reference_id": "mfsa2023-41", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-41" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-41/", "reference_id": "mfsa2023-41", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-41/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-42", "reference_id": "mfsa2023-42", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-42" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-42/", "reference_id": "mfsa2023-42", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-42/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-43", "reference_id": "mfsa2023-43", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-43" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-43/", "reference_id": "mfsa2023-43", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-43/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1848454", "reference_id": "show_bug.cgi?id=1848454", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1848454" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-5174" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6zjy-1agk-nbd9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63006?format=api", "vulnerability_id": "VCID-754j-7erb-z7ae", "summary": "Mozilla Firefox's update mechanism allowed a medium-integrity user process to interfere with the SYSTEM-level updater by manipulating the file-locking behavior. By injecting code into the user-privileged process, an attacker could bypass intended access controls, allowing SYSTEM-level file operations on paths controlled by a non-privileged user and enabling privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-2817.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-2817.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-2817", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59359", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59378", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59326", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59339", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59357", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59374", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59354", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59341", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59291", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59303", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59372", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-2817" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362902", "reference_id": "2362902", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362902" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-28", "reference_id": "mfsa2025-28", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-28" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-28/", "reference_id": "mfsa2025-28", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-29T14:20:44Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-30T03:56:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-28/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-29", "reference_id": "mfsa2025-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-29/", "reference_id": "mfsa2025-29", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-30T03:56:27Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-29T14:20:44Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-30", "reference_id": "mfsa2025-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-30/", "reference_id": "mfsa2025-30", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-29T14:20:44Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-30T03:56:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-31", "reference_id": "mfsa2025-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-31/", "reference_id": "mfsa2025-31", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-30T03:56:27Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-29T14:20:44Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-32", "reference_id": "mfsa2025-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-32" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-32/", "reference_id": "mfsa2025-32", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-29T14:20:44Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-30T03:56:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-32/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4443", "reference_id": "RHSA-2025:4443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4458", "reference_id": "RHSA-2025:4458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4460", "reference_id": "RHSA-2025:4460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4751", "reference_id": "RHSA-2025:4751", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4751" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4752", "reference_id": "RHSA-2025:4752", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4752" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4753", "reference_id": "RHSA-2025:4753", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4753" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4756", "reference_id": "RHSA-2025:4756", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4756" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4797", "reference_id": "RHSA-2025:4797", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4797" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7428", "reference_id": "RHSA-2025:7428", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7428" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7506", "reference_id": "RHSA-2025:7506", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7506" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7507", "reference_id": "RHSA-2025:7507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7543", "reference_id": "RHSA-2025:7543", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7543" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7544", "reference_id": "RHSA-2025:7544", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7544" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7545", "reference_id": "RHSA-2025:7545", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7545" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7547", "reference_id": "RHSA-2025:7547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7547" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7689", "reference_id": "RHSA-2025:7689", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7689" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7690", "reference_id": "RHSA-2025:7690", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7690" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7691", "reference_id": "RHSA-2025:7691", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7691" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7692", "reference_id": "RHSA-2025:7692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7692" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7693", "reference_id": "RHSA-2025:7693", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7693" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7694", "reference_id": "RHSA-2025:7694", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7694" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7695", "reference_id": "RHSA-2025:7695", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7695" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1917536", "reference_id": "show_bug.cgi?id=1917536", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-30T03:56:27Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-29T14:20:44Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1917536" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-2817" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-754j-7erb-z7ae" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63007?format=api", "vulnerability_id": "VCID-7939-5qcd-tqgg", "summary": "Modification of specific WebGL shader attributes could trigger an out-of-bounds read, which, when chained with other vulnerabilities, could be used to escalate privileges.*This bug only affects Firefox for macOS. Other versions of Firefox are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4082.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4082.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-4082", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56392", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.5642", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56382", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56406", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56431", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56418", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56413", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56362", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56359", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56419", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56387", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-4082" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362903", "reference_id": "2362903", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362903" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-28", "reference_id": "mfsa2025-28", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-28" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-28/", "reference_id": "mfsa2025-28", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-30T03:56:28Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-28/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-29", "reference_id": "mfsa2025-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-29/", "reference_id": "mfsa2025-29", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-30T03:56:28Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-30", "reference_id": "mfsa2025-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-30/", "reference_id": "mfsa2025-30", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-30T03:56:28Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-31", "reference_id": "mfsa2025-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-31/", "reference_id": "mfsa2025-31", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-30T03:56:28Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-32", "reference_id": "mfsa2025-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-32" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-32/", "reference_id": "mfsa2025-32", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-30T03:56:28Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-32/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1937097", "reference_id": "show_bug.cgi?id=1937097", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-30T03:56:28Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1937097" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-4082" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7939-5qcd-tqgg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31127?format=api", "vulnerability_id": "VCID-7fvy-7hpe-kbej", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38492.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38492.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-38492", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61091", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61009", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61057", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61073", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61094", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61081", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61061", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61103", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61108", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.60938", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61015", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61044", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-38492" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2002118", "reference_id": "2002118", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2002118" }, { "reference_url": "https://security.archlinux.org/AVG-2351", "reference_id": "AVG-2351", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2351" }, { "reference_url": "https://security.archlinux.org/AVG-2353", "reference_id": "AVG-2353", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2353" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-38", "reference_id": "mfsa2021-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-38" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-39", "reference_id": "mfsa2021-39", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-39" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-40", "reference_id": "mfsa2021-40", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-40" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-41", "reference_id": "mfsa2021-41", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-41" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-42", "reference_id": "mfsa2021-42", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-42" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-38492" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7fvy-7hpe-kbej" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51398?format=api", "vulnerability_id": "VCID-7sbd-1n7f-ryed", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4057.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4057.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4057", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.44044", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.4463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44567", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44619", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44622", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44639", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.4461", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44665", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44658", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44609", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4057" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228371", "reference_id": "2228371", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228371" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-33/", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-33/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4460", "reference_id": "RHSA-2023:4460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4461", "reference_id": "RHSA-2023:4461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4462", "reference_id": "RHSA-2023:4462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4463", "reference_id": "RHSA-2023:4463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4464", "reference_id": "RHSA-2023:4464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4465", "reference_id": "RHSA-2023:4465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4465" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4468", "reference_id": "RHSA-2023:4468", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4468" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4469", "reference_id": "RHSA-2023:4469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4492", "reference_id": "RHSA-2023:4492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4493", "reference_id": "RHSA-2023:4493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4494", "reference_id": "RHSA-2023:4494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4495", "reference_id": "RHSA-2023:4495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4496", "reference_id": "RHSA-2023:4496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4497", "reference_id": "RHSA-2023:4497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4499", "reference_id": "RHSA-2023:4499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4500", "reference_id": "RHSA-2023:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4500" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1841682", "reference_id": "show_bug.cgi?id=1841682", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1841682" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" }, { "reference_url": "https://usn.ubuntu.com/6405-1/", "reference_id": "USN-6405-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6405-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922199?format=api", "purl": "pkg:deb/debian/firefox-esr@115.1.0esr-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.1.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-4057" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7sbd-1n7f-ryed" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62613?format=api", "vulnerability_id": "VCID-7u5b-uzd5-7kdc", "summary": "Certain WebGL operations on Apple silicon M series devices could have lead to an out-of-bounds write and memory corruption due to a flaw in Apple's GPU driver. *This bug only affected the application on Apple M series hardware. Other platforms were unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11691.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11691.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11691", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37069", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37056", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37063", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37017", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37044", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37078", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37143", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37175", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37005", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00219", "scoring_system": "epss", "scoring_elements": "0.44625", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00219", "scoring_system": "epss", "scoring_elements": "0.44555", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11691" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328940", "reference_id": "2328940", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328940" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-30T04:55:57Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64", "reference_id": "mfsa2024-64", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-64/", "reference_id": "mfsa2024-64", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-30T04:55:57Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-64/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-65", "reference_id": "mfsa2024-65", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-65" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-65/", "reference_id": "mfsa2024-65", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-30T04:55:57Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-65/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-30T04:55:57Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68", "reference_id": "mfsa2024-68", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-68/", "reference_id": "mfsa2024-68", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-30T04:55:57Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-68/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-70", "reference_id": "mfsa2024-70", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-70" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-70/", "reference_id": "mfsa2024-70", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-30T04:55:57Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-70/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1914707", "reference_id": "show_bug.cgi?id=1914707", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-30T04:55:57Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1914707" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1924184", "reference_id": "show_bug.cgi?id=1924184", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-30T04:55:57Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1924184" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-11691" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7u5b-uzd5-7kdc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/353256?format=api", "vulnerability_id": "VCID-7xh6-s1h4-dbhw", "summary": "", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-6759.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-6759.json" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460094", "reference_id": "2460094", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460094" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-30", "reference_id": "mfsa2026-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-30/", "reference_id": "mfsa2026-30", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T15:06:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-32", "reference_id": "mfsa2026-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-32" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-32/", "reference_id": "mfsa2026-32", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T15:06:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2026-32/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-33", "reference_id": "mfsa2026-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-33/", "reference_id": "mfsa2026-33", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T15:06:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2026-33/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-34", "reference_id": "mfsa2026-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-34/", "reference_id": "mfsa2026-34", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T15:06:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2026-34/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2016164", "reference_id": "show_bug.cgi?id=2016164", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T15:06:08Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2016164" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2026-6759" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7xh6-s1h4-dbhw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63361?format=api", "vulnerability_id": "VCID-8bvd-y3qe-8qfk", "summary": "The Mozilla Maintenance Service does not guard against files being hardlinked to another file in the updates directory, allowing for the replacement of local files, including the Maintenance Service executable, which is run with privileged access. Additionally, there was a race condition during checks for junctions and symbolic links by the Maintenance Service, allowing for potential local file and directory manipulation to be undetected in some circumstances. This allows for potential privilege escalation by a user with unprivileged local access. *Note: These attacks requires local system access and only affects Windows. Other operating systems are not affected.*", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11736.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11736.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11736", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17705", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17804", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17758", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17711", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17657", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17665", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17727", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17888", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17941", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17642", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1773", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17791", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11736" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1551913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1551913" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1552206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1552206" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2019-25/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2019-25/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2019-26/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2019-26/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1748662", "reference_id": "1748662", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1748662" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11736", "reference_id": "CVE-2019-11736", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11736" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-25", "reference_id": "mfsa2019-25", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-26", "reference_id": "mfsa2019-26", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-11736" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8bvd-y3qe-8qfk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63334?format=api", "vulnerability_id": "VCID-8cv4-kvfj-4uek", "summary": "Mozilla community member Philipp reported a memory safety bug present in Firefox 68 when 360 Total Security was installed. This bug showed evidence of memory corruption in the accessibility engine and we presume that with enough effort that it could be exploited to run arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11758.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11758.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11758", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.74895", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.7486", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.74897", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.74904", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.74817", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.74819", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.74847", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.74821", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.74853", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.74867", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.74891", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.7487", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11758" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764439", "reference_id": "1764439", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764439" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-25", "reference_id": "mfsa2019-25", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33", "reference_id": "mfsa2019-33", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-33" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-35", "reference_id": "mfsa2019-35", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-35" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3193", "reference_id": "RHSA-2019:3193", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3193" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3196", "reference_id": "RHSA-2019:3196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3210", "reference_id": "RHSA-2019:3210", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3210" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3237", "reference_id": "RHSA-2019:3237", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3237" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3281", "reference_id": "RHSA-2019:3281", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3281" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3756", "reference_id": "RHSA-2019:3756", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3756" }, { "reference_url": "https://usn.ubuntu.com/4202-1/", "reference_id": "USN-4202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4202-1/" }, { "reference_url": "https://usn.ubuntu.com/4335-1/", "reference_id": "USN-4335-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4335-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-11758" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8cv4-kvfj-4uek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63346?format=api", "vulnerability_id": "VCID-8hgj-7cb6-fbbp", "summary": "A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. *Note: this vulnerability only affects Windows. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9818.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9818.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9818", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.57007", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.57024", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.57004", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.5698", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.57009", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.56865", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.56962", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.56983", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.56959", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.5701", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.57012", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9818" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712627", "reference_id": "1712627", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712627" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-13", "reference_id": "mfsa2019-13", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-14", "reference_id": "mfsa2019-14", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-15", "reference_id": "mfsa2019-15", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-9818" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8hgj-7cb6-fbbp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33668?format=api", "vulnerability_id": "VCID-8kgq-qhy6-e3c2", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38476.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38476.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38476", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40346", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40379", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.4043", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40441", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40462", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40423", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40404", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40452", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40421", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40429", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40455", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38476" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2120678", "reference_id": "2120678", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2120678" }, { "reference_url": "https://security.gentoo.org/glsa/202208-37", "reference_id": "GLSA-202208-37", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-37" }, { "reference_url": "https://security.gentoo.org/glsa/202208-38", "reference_id": "GLSA-202208-38", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-38" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-34", "reference_id": "mfsa2022-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-34/", "reference_id": "mfsa2022-34", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:23:43Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-36", "reference_id": "mfsa2022-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-36/", "reference_id": "mfsa2022-36", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:23:43Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-36/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6164", "reference_id": "RHSA-2022:6164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6165", "reference_id": "RHSA-2022:6165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6166", "reference_id": "RHSA-2022:6166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6167", "reference_id": "RHSA-2022:6167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6168", "reference_id": "RHSA-2022:6168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6169", "reference_id": "RHSA-2022:6169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6174", "reference_id": "RHSA-2022:6174", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6174" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6175", "reference_id": "RHSA-2022:6175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6176", "reference_id": "RHSA-2022:6176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6177", "reference_id": "RHSA-2022:6177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6177" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6178", "reference_id": "RHSA-2022:6178", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6178" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6179", "reference_id": "RHSA-2022:6179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6179" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1760998", "reference_id": "show_bug.cgi?id=1760998", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:23:43Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1760998" }, { "reference_url": "https://usn.ubuntu.com/5663-1/", "reference_id": "USN-5663-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5663-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922173?format=api", "purl": "pkg:deb/debian/firefox-esr@102.2.0esr-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@102.2.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-38476" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8kgq-qhy6-e3c2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56708?format=api", "vulnerability_id": "VCID-8xz8-qent-zkav", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5260.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5260.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5260", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00605", "scoring_system": "epss", "scoring_elements": "0.69546", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00605", "scoring_system": "epss", "scoring_elements": "0.69644", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00605", "scoring_system": "epss", "scoring_elements": "0.69614", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00605", "scoring_system": "epss", "scoring_elements": "0.69653", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00605", "scoring_system": "epss", "scoring_elements": "0.69662", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00605", "scoring_system": "epss", "scoring_elements": "0.69558", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00605", "scoring_system": "epss", "scoring_elements": "0.69574", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00605", "scoring_system": "epss", "scoring_elements": "0.69553", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00605", "scoring_system": "epss", "scoring_elements": "0.69604", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00605", "scoring_system": "epss", "scoring_elements": "0.6962", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00605", "scoring_system": "epss", "scoring_elements": "0.69643", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00605", "scoring_system": "epss", "scoring_elements": "0.69628", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5260" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1280294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1280294" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-74.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-74.html" }, { "reference_url": "http://www.securityfocus.com/bid/92260", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92260" }, { "reference_url": "http://www.securitytracker.com/id/1036508", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036508" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3044-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3044-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361985", "reference_id": "1361985", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361985" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5260", "reference_id": "CVE-2016-5260", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5260" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5260", "reference_id": "CVE-2016-5260", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5260" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-74", "reference_id": "mfsa2016-74", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-74" }, { "reference_url": "https://usn.ubuntu.com/3044-1/", "reference_id": "USN-3044-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3044-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5260" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8xz8-qent-zkav" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51405?format=api", "vulnerability_id": "VCID-9dpt-xfu6-cuh5", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4580.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4580.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4580", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21165", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24142", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23989", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24036", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24053", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24011", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23954", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23964", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23952", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24104", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23923", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4580" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236079", "reference_id": "2236079", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236079" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-34/", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:01:48Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-36/", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:01:48Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-36/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-38/", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:01:48Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4945", "reference_id": "RHSA-2023:4945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4946", "reference_id": "RHSA-2023:4946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4947", "reference_id": "RHSA-2023:4947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4948", "reference_id": "RHSA-2023:4948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4949", "reference_id": "RHSA-2023:4949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4950", "reference_id": "RHSA-2023:4950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4951", "reference_id": "RHSA-2023:4951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4952", "reference_id": "RHSA-2023:4952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4954", "reference_id": "RHSA-2023:4954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4955", "reference_id": "RHSA-2023:4955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4956", "reference_id": "RHSA-2023:4956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4957", "reference_id": "RHSA-2023:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4958", "reference_id": "RHSA-2023:4958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4959", "reference_id": "RHSA-2023:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5019", "reference_id": "RHSA-2023:5019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5019" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1843046", "reference_id": "show_bug.cgi?id=1843046", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:01:48Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1843046" }, { "reference_url": "https://usn.ubuntu.com/6320-1/", "reference_id": "USN-6320-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6320-1/" }, { "reference_url": "https://usn.ubuntu.com/6405-1/", "reference_id": "USN-6405-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6405-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922200?format=api", "purl": "pkg:deb/debian/firefox-esr@115.2.0esr-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.2.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-4580" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9dpt-xfu6-cuh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62654?format=api", "vulnerability_id": "VCID-9fsb-vzuc-efc5", "summary": "A buffer overflow in SkiaGl caused when a GrGLBuffer is truncated during allocation. Later writers will overflow the buffer, resulting in a potentially exploitable crash.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9894", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01889", "scoring_system": "epss", "scoring_elements": "0.83221", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01889", "scoring_system": "epss", "scoring_elements": "0.83114", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01889", "scoring_system": "epss", "scoring_elements": "0.83191", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01889", "scoring_system": "epss", "scoring_elements": "0.83185", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01889", "scoring_system": "epss", "scoring_elements": "0.83181", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01889", "scoring_system": "epss", "scoring_elements": "0.83217", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01889", "scoring_system": "epss", "scoring_elements": "0.83218", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01889", "scoring_system": "epss", "scoring_elements": "0.83131", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01889", "scoring_system": "epss", "scoring_elements": "0.83144", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01889", "scoring_system": "epss", "scoring_elements": "0.83142", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01889", "scoring_system": "epss", "scoring_elements": "0.83167", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01889", "scoring_system": "epss", "scoring_elements": "0.83175", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9894" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1306628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1306628" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-94/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-94/" }, { "reference_url": "http://www.securityfocus.com/bid/94883", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94883" }, { "reference_url": "http://www.securitytracker.com/id/1037461", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037461" }, { "reference_url": "https://security.archlinux.org/ASA-201612-15", "reference_id": "ASA-201612-15", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201612-15" }, { "reference_url": "https://security.archlinux.org/AVG-106", "reference_id": "AVG-106", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-106" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9894", "reference_id": "CVE-2016-9894", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9894" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-94", "reference_id": "mfsa2016-94", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-94" }, { "reference_url": "https://usn.ubuntu.com/3155-1/", "reference_id": "USN-3155-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3155-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9894" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9fsb-vzuc-efc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56720?format=api", "vulnerability_id": "VCID-9fxa-6w88-y3h4", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5268.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5268.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5268", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63248", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63351", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.6337", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63333", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63367", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63374", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63307", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63335", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.633", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63352", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63369", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63387", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5268" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1253673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1253673" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-83.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-83.html" }, { "reference_url": "http://www.securityfocus.com/bid/92260", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92260" }, { "reference_url": "http://www.securitytracker.com/id/1036508", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036508" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3044-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3044-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361996", "reference_id": "1361996", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361996" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5268", "reference_id": "CVE-2016-5268", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5268" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5268", "reference_id": "CVE-2016-5268", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5268" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-83", "reference_id": "mfsa2016-83", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-83" }, { "reference_url": "https://usn.ubuntu.com/3044-1/", "reference_id": "USN-3044-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3044-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5268" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9fxa-6w88-y3h4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62671?format=api", "vulnerability_id": "VCID-9gcq-8grt-vfhc", "summary": "A maliciously crafted page loaded to the sidebar through a bookmark can reference a privileged chrome window and engage in limited JavaScript operations violating cross-origin protections.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9070.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9070.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9070", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00688", "scoring_system": "epss", "scoring_elements": "0.71692", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00688", "scoring_system": "epss", "scoring_elements": "0.71762", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00688", "scoring_system": "epss", "scoring_elements": "0.71765", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00688", "scoring_system": "epss", "scoring_elements": "0.71748", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00688", "scoring_system": "epss", "scoring_elements": "0.71731", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00688", "scoring_system": "epss", "scoring_elements": "0.71774", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00688", "scoring_system": "epss", "scoring_elements": "0.7178", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00688", "scoring_system": "epss", "scoring_elements": "0.71699", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00688", "scoring_system": "epss", "scoring_elements": "0.71717", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00688", "scoring_system": "epss", "scoring_elements": "0.71691", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00688", "scoring_system": "epss", "scoring_elements": "0.71729", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00688", "scoring_system": "epss", "scoring_elements": "0.71741", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9070" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1281071", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1281071" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-89/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-89/" }, { "reference_url": "http://www.securityfocus.com/bid/94337", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94337" }, { "reference_url": "http://www.securitytracker.com/id/1037298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037298" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396549", "reference_id": "1396549", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396549" }, { "reference_url": "https://security.archlinux.org/ASA-201611-16", "reference_id": "ASA-201611-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-16" }, { "reference_url": "https://security.archlinux.org/AVG-72", "reference_id": "AVG-72", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-72" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9070", "reference_id": "CVE-2016-9070", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9070" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89", "reference_id": "mfsa2016-89", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89" }, { "reference_url": "https://usn.ubuntu.com/3124-1/", "reference_id": "USN-3124-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3124-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9070" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9gcq-8grt-vfhc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62663?format=api", "vulnerability_id": "VCID-9hep-yqmw-8bg4", "summary": "When a new Firefox profile is created on 64-bit Windows installations, the sandbox for 64-bit NPAPI plugins is not enabled by default. *Note: This issue only affects 64-bit Windows. 32-bit Windows and other operating systems are unaffected.*", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9072", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58789", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58661", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58811", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58773", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58806", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58744", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58765", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58733", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58786", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58793", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9072" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1300083", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1300083" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-89/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-89/" }, { "reference_url": "http://www.securityfocus.com/bid/94337", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94337" }, { "reference_url": "http://www.securitytracker.com/id/1037298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037298" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:x64:*", "reference_id": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:x64:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:x64:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9072", "reference_id": "CVE-2016-9072", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9072" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89", "reference_id": "mfsa2016-89", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9072" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9hep-yqmw-8bg4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62956?format=api", "vulnerability_id": "VCID-9tnr-m8mg-3ffw", "summary": "Due to insufficient escaping of the ampersand character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system.*This bug only affects Firefox for Windows. Other versions of Firefox are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5265.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5265.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-5265", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18475", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18453", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18444", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18466", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18602", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.186", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18547", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.1875", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18696", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18502", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18555", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-5265" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368748", "reference_id": "2368748", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368748" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-42", "reference_id": "mfsa2025-42", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-42" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-42/", "reference_id": "mfsa2025-42", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-28T03:55:57Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:10:15Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-42/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-43", "reference_id": "mfsa2025-43", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-43" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-43/", "reference_id": "mfsa2025-43", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-28T03:55:57Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:10:15Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-43/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-44", "reference_id": "mfsa2025-44", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-44" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-44/", "reference_id": "mfsa2025-44", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-28T03:55:57Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:10:15Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-44/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-45", "reference_id": "mfsa2025-45", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-45" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-45/", "reference_id": "mfsa2025-45", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:10:15Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-28T03:55:57Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-45/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-46", "reference_id": "mfsa2025-46", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-46" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-46/", "reference_id": "mfsa2025-46", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-28T03:55:57Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:10:15Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-46/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1962301", "reference_id": "show_bug.cgi?id=1962301", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-28T03:55:57Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:10:15Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1962301" }, { "reference_url": "https://usn.ubuntu.com/7663-1/", "reference_id": "USN-7663-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7663-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-5265" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9tnr-m8mg-3ffw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63207?format=api", "vulnerability_id": "VCID-9y48-sjn7-rqeu", "summary": "Mozilla developers and community members Kevin Brosnan, Mihai Alexandru Michis, and Christian Holler reported memory safety bugs present in Thunderbird 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38501.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38501.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-38501", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00505", "scoring_system": "epss", "scoring_elements": "0.662", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00505", "scoring_system": "epss", "scoring_elements": "0.66231", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00505", "scoring_system": "epss", "scoring_elements": "0.66236", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00505", "scoring_system": "epss", "scoring_elements": "0.6625", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00673", "scoring_system": "epss", "scoring_elements": "0.7136", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00673", "scoring_system": "epss", "scoring_elements": "0.71334", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00673", "scoring_system": "epss", "scoring_elements": "0.71341", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00673", "scoring_system": "epss", "scoring_elements": "0.71333", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00673", "scoring_system": "epss", "scoring_elements": "0.71374", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00673", "scoring_system": "epss", "scoring_elements": "0.71387", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00673", "scoring_system": "epss", "scoring_elements": "0.7141", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-38501" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011101", "reference_id": "2011101", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011101" }, { "reference_url": "https://security.archlinux.org/AVG-2443", "reference_id": "AVG-2443", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2443" }, { "reference_url": "https://security.archlinux.org/AVG-2459", "reference_id": "AVG-2459", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2459" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-43", "reference_id": "mfsa2021-43", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-43" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-45", "reference_id": "mfsa2021-45", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-45" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-47", "reference_id": "mfsa2021-47", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-47" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3755", "reference_id": "RHSA-2021:3755", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3755" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3756", "reference_id": "RHSA-2021:3756", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3756" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3757", "reference_id": "RHSA-2021:3757", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3757" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3791", "reference_id": "RHSA-2021:3791", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3791" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3838", "reference_id": "RHSA-2021:3838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3838" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3839", "reference_id": "RHSA-2021:3839", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3839" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3840", "reference_id": "RHSA-2021:3840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3841", "reference_id": "RHSA-2021:3841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3841" }, { "reference_url": "https://usn.ubuntu.com/5107-1/", "reference_id": "USN-5107-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5107-1/" }, { "reference_url": "https://usn.ubuntu.com/5132-1/", "reference_id": "USN-5132-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5132-1/" }, { "reference_url": "https://usn.ubuntu.com/5248-1/", "reference_id": "USN-5248-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5248-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-38501" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9y48-sjn7-rqeu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46037?format=api", "vulnerability_id": "VCID-a2as-nfu2-ykax", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32214.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32214.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32214", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45719", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45749", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45731", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45707", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45727", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45675", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47731", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47787", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.4778", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32214" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196743", "reference_id": "2196743", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196743" }, { "reference_url": "https://security.gentoo.org/glsa/202312-03", "reference_id": "GLSA-202312-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202312-03" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16", "reference_id": "mfsa2023-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-17", "reference_id": "mfsa2023-17", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-17" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-18", "reference_id": "mfsa2023-18", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-18" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-32214" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a2as-nfu2-ykax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63121?format=api", "vulnerability_id": "VCID-a68p-hcz6-jffj", "summary": "The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape.*Note: this issue only affects Firefox on Windows operating systems.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12388.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12388.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12388", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72256", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72216", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72259", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72269", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72174", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72179", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.722", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72211", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72223", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72247", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.7223", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12388" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831944", "reference_id": "1831944", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831944" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-16", "reference_id": "mfsa2020-16", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-16" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-17", "reference_id": "mfsa2020-17", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-17" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-12388" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a68p-hcz6-jffj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/137300?format=api", "vulnerability_id": "VCID-af5n-5ye1-s3fd", "summary": "Mozilla Firefox before 3.6 is vulnerable to XSS via the rendering of Cascading Style Sheets", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2670", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55661", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55772", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55795", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55775", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55826", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55829", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55837", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55818", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.558", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55838", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55842", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2670" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-2670" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-af5n-5ye1-s3fd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62901?format=api", "vulnerability_id": "VCID-af6b-4jqc-fugx", "summary": "The mozAddonManager allows for the installation of extensions from the CDN for addons.mozilla.org, a publicly accessible site. This could allow malicious extensions to install additional extensions from the CDN in combination with an XSS attack on Mozilla AMO sites.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5393", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00466", "scoring_system": "epss", "scoring_elements": "0.6444", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00466", "scoring_system": "epss", "scoring_elements": "0.64322", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00466", "scoring_system": "epss", "scoring_elements": "0.64442", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00466", "scoring_system": "epss", "scoring_elements": "0.64401", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00466", "scoring_system": "epss", "scoring_elements": "0.64435", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00466", "scoring_system": "epss", "scoring_elements": "0.64447", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00466", "scoring_system": "epss", "scoring_elements": "0.64376", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00466", "scoring_system": "epss", "scoring_elements": "0.64405", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00466", "scoring_system": "epss", "scoring_elements": "0.64366", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00466", "scoring_system": "epss", "scoring_elements": "0.64414", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00466", "scoring_system": "epss", "scoring_elements": "0.64429", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5393" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1309282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1309282" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-01/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-01/" }, { "reference_url": "http://www.securityfocus.com/bid/95763", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/95763" }, { "reference_url": "http://www.securitytracker.com/id/1037693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037693" }, { "reference_url": "https://security.archlinux.org/ASA-201701-39", "reference_id": "ASA-201701-39", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-39" }, { "reference_url": "https://security.archlinux.org/AVG-157", "reference_id": "AVG-157", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-157" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5393", "reference_id": "CVE-2017-5393", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5393" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01", "reference_id": "mfsa2017-01", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01" }, { "reference_url": "https://usn.ubuntu.com/3175-1/", "reference_id": "USN-3175-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3175-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-5393" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-af6b-4jqc-fugx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62904?format=api", "vulnerability_id": "VCID-ahzr-nr7g-5ue2", "summary": "A STUN server in conjunction with a large number of webkitRTCPeerConnection objects can be used to send large STUN packets in a short period of time due to a lack of rate limiting being applied on e10s systems, allowing for a denial of service attack.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5388", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79607", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79526", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79583", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79575", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79605", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79604", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79532", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79555", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79542", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.7957", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79578", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79599", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5388" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1281482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1281482" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-01/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-01/" }, { "reference_url": "http://www.securityfocus.com/bid/95763", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/95763" }, { "reference_url": "http://www.securitytracker.com/id/1037693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037693" }, { "reference_url": "https://security.archlinux.org/ASA-201701-39", "reference_id": "ASA-201701-39", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-39" }, { "reference_url": "https://security.archlinux.org/AVG-157", "reference_id": "AVG-157", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-157" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5388", "reference_id": "CVE-2017-5388", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5388" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01", "reference_id": "mfsa2017-01", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01" }, { "reference_url": "https://usn.ubuntu.com/3175-1/", "reference_id": "USN-3175-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3175-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-5388" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ahzr-nr7g-5ue2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/137298?format=api", "vulnerability_id": "VCID-akwm-tx92-bqfs", "summary": "Mozilla Firefox through 1.5.0.3 has a vulnerability in processing the content-length header", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2668", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61722", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61796", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61826", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61845", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.6186", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61882", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.6187", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.6185", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61893", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61898", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2668" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-2668" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-akwm-tx92-bqfs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62963?format=api", "vulnerability_id": "VCID-avgs-nz9j-gqg8", "summary": "On Windows, a compromised content process could use bad StreamData sent over AudioIPC to trigger a use-after-free in the Browser process. This could have led to a sandbox escape.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1930.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1930.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1930", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55858", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55836", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55901", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55891", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55888", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55837", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56934", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56931", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56905", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56928", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57621", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1930" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2349787", "reference_id": "2349787", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2349787" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-14", "reference_id": "mfsa2025-14", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-14" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", "reference_id": "mfsa2025-14", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T16:42:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-15", "reference_id": "mfsa2025-15", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-15" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-15/", "reference_id": "mfsa2025-15", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T16:42:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-15/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-16", "reference_id": "mfsa2025-16", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-16" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-16/", "reference_id": "mfsa2025-16", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T16:42:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-16/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-17", "reference_id": "mfsa2025-17", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-17" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-17/", "reference_id": "mfsa2025-17", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T16:42:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-17/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-18", "reference_id": "mfsa2025-18", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-18" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-18/", "reference_id": "mfsa2025-18", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T16:42:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-18/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2359", "reference_id": "RHSA-2025:2359", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2359" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2452", "reference_id": "RHSA-2025:2452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2479", "reference_id": "RHSA-2025:2479", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2479" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2480", "reference_id": "RHSA-2025:2480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2481", "reference_id": "RHSA-2025:2481", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2481" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2484", "reference_id": "RHSA-2025:2484", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2484" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2485", "reference_id": "RHSA-2025:2485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2485" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2486", "reference_id": "RHSA-2025:2486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2699", "reference_id": "RHSA-2025:2699", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2699" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2708", "reference_id": "RHSA-2025:2708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2708" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1902309", "reference_id": "show_bug.cgi?id=1902309", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T16:42:08Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1902309" }, { "reference_url": "https://usn.ubuntu.com/7663-1/", "reference_id": "USN-7663-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7663-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-1930" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-avgs-nz9j-gqg8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63320?format=api", "vulnerability_id": "VCID-ax8a-z9s4-e3dk", "summary": "A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is configured as the default URI handler for a given URI scheme in third party applications and these applications insufficiently sanitize URL data. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9794.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9794.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9794", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.6189", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61879", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61859", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61902", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61907", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.6173", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61804", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61834", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61805", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61854", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61869", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61891", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9794" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690679", "reference_id": "1690679", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690679" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-07", "reference_id": "mfsa2019-07", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-07" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-08", "reference_id": "mfsa2019-08", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-11", "reference_id": "mfsa2019-11", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-11" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-9794" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ax8a-z9s4-e3dk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63159?format=api", "vulnerability_id": "VCID-b28z-4pwb-buc2", "summary": "When following a link that opened an intent://-schemed URL, causing a custom tab to be opened, Firefox for Android could be tricked into displaying the incorrect URI. *Note: This issue only affects Firefox for Android. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6827.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6827.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6827", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55038", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55183", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.552", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55204", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55139", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55163", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55138", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55187", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55199", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.5518", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55162", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6827" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821968", "reference_id": "1821968", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821968" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-13", "reference_id": "mfsa2020-13", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-13" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-6827" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b28z-4pwb-buc2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56674?format=api", "vulnerability_id": "VCID-b65s-fwk5-gkbs", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2827.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2827.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2827", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63459", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63519", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63546", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.6351", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63562", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63579", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63595", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.6358", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63582", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.6359", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63574", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2827" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377660", "reference_id": "1377660", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377660" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-85", "reference_id": "mfsa2016-85", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-85" }, { "reference_url": "https://usn.ubuntu.com/3076-1/", "reference_id": "USN-3076-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3076-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2827" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b65s-fwk5-gkbs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63336?format=api", "vulnerability_id": "VCID-b8qk-zbj4-yfg2", "summary": "When setting a thread name on Windows in WebRTC, an incorrect number of arguments could have been supplied, leading to stack corruption and a potentially exploitable crash. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13722.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13722.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-13722", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00356", "scoring_system": "epss", "scoring_elements": "0.57873", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00356", "scoring_system": "epss", "scoring_elements": "0.57888", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00356", "scoring_system": "epss", "scoring_elements": "0.57867", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00356", "scoring_system": "epss", "scoring_elements": "0.57897", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00356", "scoring_system": "epss", "scoring_elements": "0.57896", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00356", "scoring_system": "epss", "scoring_elements": "0.57759", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00356", "scoring_system": "epss", "scoring_elements": "0.57843", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00356", "scoring_system": "epss", "scoring_elements": "0.57863", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00356", "scoring_system": "epss", "scoring_elements": "0.57839", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00356", "scoring_system": "epss", "scoring_elements": "0.57893", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00356", "scoring_system": "epss", "scoring_elements": "0.57895", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00356", "scoring_system": "epss", "scoring_elements": "0.57911", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-13722" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779432", "reference_id": "1779432", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779432" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-36", "reference_id": "mfsa2019-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-36" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-37", "reference_id": "mfsa2019-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-37" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-38", "reference_id": "mfsa2019-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-38" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-13722" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b8qk-zbj4-yfg2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62843?format=api", "vulnerability_id": "VCID-baq3-sm51-3qae", "summary": "An error in the WindowsDllDetourPatcher where a RWX (\"Read/Write/Execute\") 4k block is allocated but never protected, violating DEP protections. *Note: This attack only affects Windows operating systems. Other operating systems are not affected.*", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7782", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66404", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66412", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66398", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66368", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66403", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66419", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66294", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66333", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.6636", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66329", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66377", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66391", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7782" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1344034", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1344034" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-18/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-18/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-19/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-19/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-20/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-20/" }, { "reference_url": "http://www.securityfocus.com/bid/100243", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/100243" }, { "reference_url": "http://www.securitytracker.com/id/1039124", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1039124" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7782", "reference_id": "CVE-2017-7782", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7782" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-18", "reference_id": "mfsa2017-18", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-18" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-19", "reference_id": "mfsa2017-19", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-19" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-20", "reference_id": "mfsa2017-20", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-20" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-7782" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-baq3-sm51-3qae" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56716?format=api", "vulnerability_id": "VCID-bb61-y349-fqgx", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5266.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5266.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5266", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62334", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62491", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62474", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62463", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62441", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62485", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62392", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62423", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62389", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62437", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62455", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5266" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1226977", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1226977" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-81.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-81.html" }, { "reference_url": "http://www.securityfocus.com/bid/92260", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92260" }, { "reference_url": "http://www.securitytracker.com/id/1036508", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036508" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3044-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3044-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361995", "reference_id": "1361995", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361995" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5266", "reference_id": "CVE-2016-5266", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5266" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5266", "reference_id": "CVE-2016-5266", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5266" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-81", "reference_id": "mfsa2016-81", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-81" }, { "reference_url": "https://usn.ubuntu.com/3044-1/", "reference_id": "USN-3044-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3044-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5266" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bb61-y349-fqgx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63482?format=api", "vulnerability_id": "VCID-bbsb-t7kv-4bbw", "summary": "Mozilla developers and community members reported several memory safety bugs in the\nbrowser engine used in Firefox and other Mozilla-based products. Some of these bugs showed\nevidence of memory corruption under certain circumstances, and we presume that with enough\neffort at least some of these could be exploited to run arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2815.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2815.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2815", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58326", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58199", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58333", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58313", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58346", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58349", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58284", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58305", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58279", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58332", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58338", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58356", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2815" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1241896", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1241896" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1242798", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1242798" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1243466", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1243466" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1245743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1245743" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1264300", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1264300" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1271037", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1271037" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-49.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-49.html" }, { "reference_url": "http://www.securityfocus.com/bid/91075", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/91075" }, { "reference_url": "http://www.securitytracker.com/id/1036057", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036057" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2993-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2993-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1342890", "reference_id": "1342890", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1342890" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2815", "reference_id": "CVE-2016-2815", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2815" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2815", "reference_id": "CVE-2016-2815", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2815" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-49", "reference_id": "mfsa2016-49", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-49" }, { "reference_url": "https://usn.ubuntu.com/2993-1/", "reference_id": "USN-2993-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2993-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2815" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bbsb-t7kv-4bbw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36864?format=api", "vulnerability_id": "VCID-bd6g-ev4d-kyf6", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird and\n Firefox, the worst of which could lead to the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18335.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18335.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18335", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01594", "scoring_system": "epss", "scoring_elements": "0.81708", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01594", "scoring_system": "epss", "scoring_elements": "0.81665", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01594", "scoring_system": "epss", "scoring_elements": "0.81685", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01594", "scoring_system": "epss", "scoring_elements": "0.81673", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01594", "scoring_system": "epss", "scoring_elements": "0.81666", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01594", "scoring_system": "epss", "scoring_elements": "0.81704", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01594", "scoring_system": "epss", "scoring_elements": "0.81603", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01594", "scoring_system": "epss", "scoring_elements": "0.81614", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01594", "scoring_system": "epss", "scoring_elements": "0.81635", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01594", "scoring_system": "epss", "scoring_elements": "0.81633", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01594", "scoring_system": "epss", "scoring_elements": "0.8166", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18335" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18335", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18335" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18336", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18336" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18337", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18337" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18339", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18339" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18342", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18342" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18343", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18343" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18344", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18344" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18345", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18345" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18346", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18346" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18347", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18347" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18348", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18348" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18349", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18349" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18350", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18350" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18351", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18351" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18352", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18352" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18353" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18354", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18354" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18355", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18355" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18357", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18357" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18358", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18358" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18359", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18359" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20065", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20065" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20066", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20066" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20067", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20067" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20068", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20068" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20070", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20070" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20346", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20346" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656549", "reference_id": "1656549", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656549" }, { "reference_url": "https://security.archlinux.org/ASA-201812-2", "reference_id": "ASA-201812-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201812-2" }, { "reference_url": "https://security.archlinux.org/ASA-201902-23", "reference_id": "ASA-201902-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201902-23" }, { "reference_url": "https://security.archlinux.org/AVG-824", "reference_id": "AVG-824", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-824" }, { "reference_url": "https://security.archlinux.org/AVG-908", "reference_id": "AVG-908", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-908" }, { "reference_url": "https://security.gentoo.org/glsa/201904-07", "reference_id": "GLSA-201904-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201904-07" }, { "reference_url": "https://security.gentoo.org/glsa/201908-18", "reference_id": "GLSA-201908-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-18" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-05", "reference_id": "mfsa2019-05", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-05" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-06", "reference_id": "mfsa2019-06", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3803", "reference_id": "RHSA-2018:3803", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3803" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-18335" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bd6g-ev4d-kyf6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50254?format=api", "vulnerability_id": "VCID-c52k-tg8d-sbeg", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23599.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23599.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23599", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34371", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34422", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34451", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34453", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34414", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.3439", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34425", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34412", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34484", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34512", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34379", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23599" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162339", "reference_id": "2162339", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162339" }, { "reference_url": "https://security.gentoo.org/glsa/202305-06", "reference_id": "GLSA-202305-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202305-06" }, { "reference_url": "https://security.gentoo.org/glsa/202305-13", "reference_id": "GLSA-202305-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202305-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-01", "reference_id": "mfsa2023-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-01/", "reference_id": "mfsa2023-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:21:01Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-02", "reference_id": "mfsa2023-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-02/", "reference_id": "mfsa2023-02", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:21:01Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-03", "reference_id": "mfsa2023-03", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-03" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-03/", "reference_id": "mfsa2023-03", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:21:01Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-03/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0285", "reference_id": "RHSA-2023:0285", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0285" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0286", "reference_id": "RHSA-2023:0286", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0286" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0288", "reference_id": "RHSA-2023:0288", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0288" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0289", "reference_id": "RHSA-2023:0289", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0289" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0290", "reference_id": "RHSA-2023:0290", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0290" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0294", "reference_id": "RHSA-2023:0294", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0294" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0295", "reference_id": "RHSA-2023:0295", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0295" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0296", "reference_id": "RHSA-2023:0296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0296" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0456", "reference_id": "RHSA-2023:0456", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0456" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0457", "reference_id": "RHSA-2023:0457", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0457" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0459", "reference_id": "RHSA-2023:0459", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0459" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0460", "reference_id": "RHSA-2023:0460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0461", "reference_id": "RHSA-2023:0461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0462", "reference_id": "RHSA-2023:0462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0463", "reference_id": "RHSA-2023:0463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0476", "reference_id": "RHSA-2023:0476", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0476" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1777800", "reference_id": "show_bug.cgi?id=1777800", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:21:01Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1777800" }, { "reference_url": "https://usn.ubuntu.com/5816-1/", "reference_id": "USN-5816-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5816-1/" }, { "reference_url": "https://usn.ubuntu.com/5824-1/", "reference_id": "USN-5824-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5824-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-23599" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c52k-tg8d-sbeg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63497?format=api", "vulnerability_id": "VCID-c6jc-3917-x7dx", "summary": "Security researcher Tim McCormack reported that when a page requests a\nseries of permissions in a short timespan, the resulting permission notifications can show\nthe icon for the wrong permission request. This can lead to user confusion and inadvertent\nconsent given when a user is prompted by web content to give permissions, such as for\ngeolocation or microphone access.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2829.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2829.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2829", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58839", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58704", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.5882", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58826", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58844", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58807", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58778", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58799", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58768", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2829" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1248329", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1248329" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-57.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-57.html" }, { "reference_url": "http://www.securitytracker.com/id/1036057", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036057" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2993-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2993-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1342896", "reference_id": "1342896", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1342896" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2829", "reference_id": "CVE-2016-2829", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2829" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2829", "reference_id": "CVE-2016-2829", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2829" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-57", "reference_id": "mfsa2016-57", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-57" }, { "reference_url": "https://usn.ubuntu.com/2993-1/", "reference_id": "USN-2993-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2993-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2829" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c6jc-3917-x7dx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51402?format=api", "vulnerability_id": "VCID-cfqv-7r6b-g3e9", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4576.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4576.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4576", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55549", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55561", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55558", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55538", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55559", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55521", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55497", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55539", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4576" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236074", "reference_id": "2236074", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236074" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-34/", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-35", "reference_id": "mfsa2023-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-35" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-35/", "reference_id": "mfsa2023-35", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-35/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-36/", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-36/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-37", "reference_id": "mfsa2023-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-37" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-37/", "reference_id": "mfsa2023-37", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-37/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-38/", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-38/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846694", "reference_id": "show_bug.cgi?id=1846694", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846694" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-4576" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cfqv-7r6b-g3e9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62883?format=api", "vulnerability_id": "VCID-cfy8-73k1-jkdj", "summary": "The Mozilla Maintenance Service helper.exe application creates a temporary directory writable by non-privileged users. When this is combined with creation of a junction (a form of symbolic link), protected files in the target directory of the junction can be deleted by the Mozilla Maintenance Service, which has privileged access. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7761", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24758", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24834", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24778", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.2479", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24781", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24855", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24933", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24973", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24747", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24814", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24859", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24872", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7761" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1215648", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1215648" }, { "reference_url": "https://sourceforge.net/p/nsis/bugs/1125/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceforge.net/p/nsis/bugs/1125/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-15/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-15/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-16/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-16/" }, { "reference_url": "http://www.securityfocus.com/bid/99057", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/99057" }, { "reference_url": "http://www.securitytracker.com/id/1038689", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1038689" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7761", "reference_id": "CVE-2017-7761", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:P/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7761" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-15", "reference_id": "mfsa2017-15", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-16", "reference_id": "mfsa2017-16", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-7761" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cfy8-73k1-jkdj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63090?format=api", "vulnerability_id": "VCID-cmnc-fyxb-rfd4", "summary": "An attacker could have caused an out of bounds memory access using WebGL APIs, leading to memory corruption and a potentially exploitable crash.*This bug only affects Firefox for macOS. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29531.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29531.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29531", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00553", "scoring_system": "epss", "scoring_elements": "0.68015", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00553", "scoring_system": "epss", "scoring_elements": "0.68068", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00553", "scoring_system": "epss", "scoring_elements": "0.68082", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00553", "scoring_system": "epss", "scoring_elements": "0.68059", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00553", "scoring_system": "epss", "scoring_elements": "0.68044", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00553", "scoring_system": "epss", "scoring_elements": "0.67993", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00553", "scoring_system": "epss", "scoring_elements": "0.67996", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00553", "scoring_system": "epss", "scoring_elements": "0.68034", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.69213", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.69193", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.69205", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29531" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186099", "reference_id": "2186099", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186099" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-13", "reference_id": "mfsa2023-13", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-13" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-13/", "reference_id": "mfsa2023-13", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-11T15:34:50Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-13/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-14", "reference_id": "mfsa2023-14", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-14" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-14/", "reference_id": "mfsa2023-14", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-11T15:34:50Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-14/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-15", "reference_id": "mfsa2023-15", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-15" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-15/", "reference_id": "mfsa2023-15", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-11T15:34:50Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-15/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1794292", "reference_id": "show_bug.cgi?id=1794292", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-11T15:34:50Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1794292" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-29531" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cmnc-fyxb-rfd4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62884?format=api", "vulnerability_id": "VCID-cpra-u2v5-3qg5", "summary": "An attack using manipulation of updater.ini contents, used by the Mozilla Windows Updater, and privilege escalation through the Mozilla Maintenance Service to allow for arbitrary file execution and deletion by the Maintenance Service, which has privileged access. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7766", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38755", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38839", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38812", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38857", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38835", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38713", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.3885", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38871", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.388", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38852", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38864", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38876", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7766" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1342742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1342742" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-15/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-15/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-16/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-16/" }, { "reference_url": "http://www.securityfocus.com/bid/99057", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/99057" }, { "reference_url": "http://www.securitytracker.com/id/1038689", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1038689" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7766", "reference_id": "CVE-2017-7766", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7766" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-15", "reference_id": "mfsa2017-15", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-16", "reference_id": "mfsa2017-16", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-7766" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cpra-u2v5-3qg5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62677?format=api", "vulnerability_id": "VCID-cqtb-7t8w-rug2", "summary": "A potentially exploitable use-after-free crash during actor destruction with service workers. This issue does not affect releases earlier than Firefox 49.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5287.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5287.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5287", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68295", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68389", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68393", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.6836", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68399", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68411", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68315", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68335", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68311", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68362", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68379", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68405", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5287" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1309823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1309823" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-87/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-87/" }, { "reference_url": "http://www.securityfocus.com/bid/93811", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/93811" }, { "reference_url": "http://www.securitytracker.com/id/1037077", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037077" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387586", "reference_id": "1387586", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387586" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5287", "reference_id": "CVE-2016-5287", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5287" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-87", "reference_id": "mfsa2016-87", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-87" }, { "reference_url": "https://usn.ubuntu.com/3111-1/", "reference_id": "USN-3111-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3111-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5287" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cqtb-7t8w-rug2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62842?format=api", "vulnerability_id": "VCID-d5hs-m1zz-kybj", "summary": "The destructor function for the WindowsDllDetourPatcher class can be re-purposed by malicious code in concert with another vulnerability to write arbitrary data to an attacker controlled location in memory. This can be used to bypass existing memory protections in this situation. *Note: This attack only affects Windows operating systems. Other operating systems are not affected.*", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7804", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71787", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71791", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71775", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71757", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71799", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71805", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71717", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71724", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71743", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71756", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71767", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7804" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1372849", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1372849" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-18/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-18/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-19/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-19/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-20/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-20/" }, { "reference_url": "http://www.securityfocus.com/bid/100234", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/100234" }, { "reference_url": "http://www.securitytracker.com/id/1039124", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1039124" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7804", "reference_id": "CVE-2017-7804", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7804" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-18", "reference_id": "mfsa2017-18", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-18" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-19", "reference_id": "mfsa2017-19", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-19" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-20", "reference_id": "mfsa2017-20", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-20" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-7804" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d5hs-m1zz-kybj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56689?format=api", "vulnerability_id": "VCID-d9dm-aww1-pfbm", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5253", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18208", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18272", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18226", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1817", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18181", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18423", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18477", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18186", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1827", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18324", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18325", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18278", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5253" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1246944", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1246944" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-69.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-69.html" }, { "reference_url": "http://www.securityfocus.com/bid/92260", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92260" }, { "reference_url": "http://www.securitytracker.com/id/1036508", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036508" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5253", "reference_id": "CVE-2016-5253", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5253" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5253", "reference_id": "CVE-2016-5253", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:C/A:N" }, { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5253" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-69", "reference_id": "mfsa2016-69", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-69" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5253" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d9dm-aww1-pfbm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56672?format=api", "vulnerability_id": "VCID-de4g-6sjv-6ugg", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2820.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2820.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2820", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62025", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61866", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62016", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61995", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62038", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62043", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61939", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61969", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61988", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62006", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62027", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2820" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=870870", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=870870" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-48.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-48.html" }, { "reference_url": "http://www.securitytracker.com/id/1035692", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035692" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2936-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2936-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2936-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2936-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2936-3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2936-3" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330287", "reference_id": "1330287", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330287" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2820", "reference_id": "CVE-2016-2820", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2820" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2820", "reference_id": "CVE-2016-2820", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2820" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-48", "reference_id": "mfsa2016-48", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-48" }, { "reference_url": "https://usn.ubuntu.com/2936-1/", "reference_id": "USN-2936-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2936-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2820" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-de4g-6sjv-6ugg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62896?format=api", "vulnerability_id": "VCID-dv2d-9a59-xkaq", "summary": "Proxy Auto-Config (PAC) files can specify a JavaScript function called for all URL requests with the full URL path which exposes more information than would be sent to the proxy itself in the case of HTTPS. Normally the Proxy Auto-Config file is specified by the user or machine owner and presumed to be non-malicious, but if a user has enabled Web Proxy Auto Detect (WPAD) this file can be served remotely.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5384", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73466", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.7337", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73428", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.7342", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73463", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73471", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73378", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73402", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73374", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73411", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73425", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73448", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5384" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1255474", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1255474" }, { "reference_url": "https://www.contextis.com//resources/blog/leaking-https-urls-20-year-old-vulnerability/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.contextis.com//resources/blog/leaking-https-urls-20-year-old-vulnerability/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-01/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-01/" }, { "reference_url": "http://www.securityfocus.com/bid/95763", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/95763" }, { "reference_url": "http://www.securitytracker.com/id/1037693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037693" }, { "reference_url": "https://security.archlinux.org/ASA-201701-39", "reference_id": "ASA-201701-39", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-39" }, { "reference_url": "https://security.archlinux.org/AVG-157", "reference_id": "AVG-157", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-157" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5384", "reference_id": "CVE-2017-5384", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5384" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01", "reference_id": "mfsa2017-01", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01" }, { "reference_url": "https://usn.ubuntu.com/3175-1/", "reference_id": "USN-3175-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3175-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-5384" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dv2d-9a59-xkaq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33949?format=api", "vulnerability_id": "VCID-dveb-sthz-bkgu", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25738.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25738.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25738", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37145", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37201", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37303", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37218", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37172", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37199", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37233", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37223", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37208", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37329", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37156", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25738" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170380", "reference_id": "2170380", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170380" }, { "reference_url": "https://security.gentoo.org/glsa/202305-35", "reference_id": "GLSA-202305-35", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202305-35" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-05", "reference_id": "mfsa2023-05", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-05" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-05/", "reference_id": "mfsa2023-05", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T20:08:20Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-05/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-06", "reference_id": "mfsa2023-06", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-06" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-06/", "reference_id": "mfsa2023-06", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T20:08:20Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-06/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-07", "reference_id": "mfsa2023-07", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-07" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-07/", "reference_id": "mfsa2023-07", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T20:08:20Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-07/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1811852", "reference_id": "show_bug.cgi?id=1811852", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T20:08:20Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1811852" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-25738" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dveb-sthz-bkgu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56663?format=api", "vulnerability_id": "VCID-dyn7-63ve-37at", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "http://dl.acm.org/citation.cfm?id=2714650", "reference_id": "", "reference_type": "", "scores": [], "url": "http://dl.acm.org/citation.cfm?id=2714650" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2813.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2813.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2813", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64692", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64578", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64687", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64658", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64694", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64706", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64631", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.6466", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64617", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64666", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64682", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64698", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2813" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1197901", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1197901" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-43.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-43.html" }, { "reference_url": "http://www.securitytracker.com/id/1035692", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035692" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330278", "reference_id": "1330278", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330278" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2813", "reference_id": "CVE-2016-2813", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2813" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2813", "reference_id": "CVE-2016-2813", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2813" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-43", "reference_id": "mfsa2016-43", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-43" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2813" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dyn7-63ve-37at" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62894?format=api", "vulnerability_id": "VCID-e2ww-ngam-cugq", "summary": "The \"export\" function in the Certificate Viewer can force local filesystem navigation when the \"common name\" in a certificate contains slashes, allowing certificate content to be saved in unsafe locations with an arbitrary filename.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5381", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01264", "scoring_system": "epss", "scoring_elements": "0.79474", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01264", "scoring_system": "epss", "scoring_elements": "0.79392", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01264", "scoring_system": "epss", "scoring_elements": "0.79452", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01264", "scoring_system": "epss", "scoring_elements": "0.79441", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01264", "scoring_system": "epss", "scoring_elements": "0.79471", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01264", "scoring_system": "epss", "scoring_elements": "0.7947", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01264", "scoring_system": "epss", "scoring_elements": "0.79399", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01264", "scoring_system": "epss", "scoring_elements": "0.79421", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01264", "scoring_system": "epss", "scoring_elements": "0.79408", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01264", "scoring_system": "epss", "scoring_elements": "0.79436", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01264", "scoring_system": "epss", "scoring_elements": "0.79445", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01264", "scoring_system": "epss", "scoring_elements": "0.79468", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5381" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1017616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1017616" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-01/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-01/" }, { "reference_url": "http://www.securityfocus.com/bid/95763", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/95763" }, { "reference_url": "http://www.securitytracker.com/id/1037693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037693" }, { "reference_url": "https://security.archlinux.org/ASA-201701-39", "reference_id": "ASA-201701-39", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-39" }, { "reference_url": "https://security.archlinux.org/AVG-157", "reference_id": "AVG-157", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-157" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5381", "reference_id": "CVE-2017-5381", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5381" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01", "reference_id": "mfsa2017-01", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01" }, { "reference_url": "https://usn.ubuntu.com/3175-1/", "reference_id": "USN-3175-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3175-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-5381" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e2ww-ngam-cugq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62617?format=api", "vulnerability_id": "VCID-e7p8-zrwx-5ug6", "summary": "A flaw in handling fullscreen transitions may have inadvertently caused the application to become stuck in fullscreen mode when a modal dialog was opened during the transition. This issue left users unable to exit fullscreen mode using standard actions like pressing \"Esc\" or accessing right-click menus, resulting in a disrupted browsing experience until the browser is restarted. *This bug only affects the application when running on macOS. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11698.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11698.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11698", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39212", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.3918", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39198", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39236", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39224", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39208", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39154", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39234", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47075", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47127", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11698" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328953", "reference_id": "2328953", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328953" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:16:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64", "reference_id": "mfsa2024-64", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-64/", "reference_id": "mfsa2024-64", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:16:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-64/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:16:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68", "reference_id": "mfsa2024-68", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-68/", "reference_id": "mfsa2024-68", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:16:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-68/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1916152", "reference_id": "show_bug.cgi?id=1916152", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:16:08Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1916152" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-11698" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e7p8-zrwx-5ug6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63094?format=api", "vulnerability_id": "VCID-ebhp-kzkz-euhu", "summary": "Similar to CVE-2023-28163, this time when choosing 'Save Link As', suggested filenames containing environment variable names would have resolved those in the context of the current user. *This bug only affects Firefox on Windows. Other versions of Firefox are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29545.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29545.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29545", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57006", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57048", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57069", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57058", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57056", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57029", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57007", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57024", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58684", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.5866", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58679", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29545" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186108", "reference_id": "2186108", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186108" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-13", "reference_id": "mfsa2023-13", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-13" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-13/", "reference_id": "mfsa2023-13", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T15:48:18Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-13/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-14", "reference_id": "mfsa2023-14", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-14" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-14/", "reference_id": "mfsa2023-14", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T15:48:18Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-14/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-15", "reference_id": "mfsa2023-15", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-15" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-15/", "reference_id": "mfsa2023-15", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T15:48:18Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-15/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1823077", "reference_id": "show_bug.cgi?id=1823077", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T15:48:18Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1823077" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-29545" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ebhp-kzkz-euhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62706?format=api", "vulnerability_id": "VCID-efvs-1tuf-guf4", "summary": "Information disclosure in the Widget: Cocoa component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4712.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4712.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-4712", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03584", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03461", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03538", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03528", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03572", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.0355", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03549", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03524", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03449", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03475", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03499", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-4712" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450728", "reference_id": "2450728", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450728" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-20", "reference_id": "mfsa2026-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-20" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-20/", "reference_id": "mfsa2026-20", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T17:49:31Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2026-20/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-22", "reference_id": "mfsa2026-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-22" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-22/", "reference_id": "mfsa2026-22", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T17:49:31Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-23", "reference_id": "mfsa2026-23", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-23" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-23/", "reference_id": "mfsa2026-23", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T17:49:31Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2026-23/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-24", "reference_id": "mfsa2026-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-24/", "reference_id": "mfsa2026-24", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T17:49:31Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5930", "reference_id": "RHSA-2026:5930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5931", "reference_id": "RHSA-2026:5931", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5931" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5932", "reference_id": "RHSA-2026:5932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5932" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6188", "reference_id": "RHSA-2026:6188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6342", "reference_id": "RHSA-2026:6342", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6342" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6917", "reference_id": "RHSA-2026:6917", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6917" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7837", "reference_id": "RHSA-2026:7837", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7838", "reference_id": "RHSA-2026:7838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7838" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7839", "reference_id": "RHSA-2026:7839", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7839" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7840", "reference_id": "RHSA-2026:7840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7841", "reference_id": "RHSA-2026:7841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7841" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7842", "reference_id": "RHSA-2026:7842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7843", "reference_id": "RHSA-2026:7843", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7843" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7845", "reference_id": "RHSA-2026:7845", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7845" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7858", "reference_id": "RHSA-2026:7858", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7858" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8284", "reference_id": "RHSA-2026:8284", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8284" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8285", "reference_id": "RHSA-2026:8285", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8285" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8286", "reference_id": "RHSA-2026:8286", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8286" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8287", "reference_id": "RHSA-2026:8287", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8287" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8288", "reference_id": "RHSA-2026:8288", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8288" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8289", "reference_id": "RHSA-2026:8289", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8289" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8290", "reference_id": "RHSA-2026:8290", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8290" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8315", "reference_id": "RHSA-2026:8315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8315" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8427", "reference_id": "RHSA-2026:8427", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8427" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8850", "reference_id": "RHSA-2026:8850", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8850" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2017666", "reference_id": "show_bug.cgi?id=2017666", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T17:49:31Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2017666" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2026-4712" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-efvs-1tuf-guf4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/137299?format=api", "vulnerability_id": "VCID-ewet-6xtr-sqdn", "summary": "Mozilla Firefox prior to 3.6 has a DoS vulnerability due to an issue in the validation of certificates.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2669", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42925", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42989", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.43016", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42953", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.43003", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.43038", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.43004", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42987", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.43047", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.43035", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42971", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2669" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-2669" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ewet-6xtr-sqdn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62615?format=api", "vulnerability_id": "VCID-f4ja-2ydw-cufu", "summary": "The executable file warning was not presented when downloading .library-ms files. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11693.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11693.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11693", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0029", "scoring_system": "epss", "scoring_elements": "0.52339", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0029", "scoring_system": "epss", "scoring_elements": "0.52402", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0029", "scoring_system": "epss", "scoring_elements": "0.52415", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0029", "scoring_system": "epss", "scoring_elements": "0.52431", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0029", "scoring_system": "epss", "scoring_elements": "0.52381", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0029", "scoring_system": "epss", "scoring_elements": "0.52386", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0029", "scoring_system": "epss", "scoring_elements": "0.52333", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0029", "scoring_system": "epss", "scoring_elements": "0.52367", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0029", "scoring_system": "epss", "scoring_elements": "0.52441", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60327", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60312", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11693" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328949", "reference_id": "2328949", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328949" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:32:54Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64", "reference_id": "mfsa2024-64", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-64/", "reference_id": "mfsa2024-64", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:32:54Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-64/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:32:54Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68", "reference_id": "mfsa2024-68", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-68/", "reference_id": "mfsa2024-68", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:32:54Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-68/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1921458", "reference_id": "show_bug.cgi?id=1921458", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:32:54Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1921458" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-11693" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f4ja-2ydw-cufu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63091?format=api", "vulnerability_id": "VCID-f8c7-p8nz-bbap", "summary": "A local attacker can trick the Mozilla Maintenance Service into applying an unsigned update file by pointing the service at an update file on a malicious SMB server. The update file can be replaced after the signature check, before the use, because the write-lock requested by the service does not work on a SMB server.*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29532.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29532.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29532", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22475", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22642", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22627", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22611", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22557", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22685", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23453", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23508", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24561", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24527", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24552", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29532" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186100", "reference_id": "2186100", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186100" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-13", "reference_id": "mfsa2023-13", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-13" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-13/", "reference_id": "mfsa2023-13", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T15:43:12Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-13/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-14", "reference_id": "mfsa2023-14", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-14" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-14/", "reference_id": "mfsa2023-14", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T15:43:12Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-14/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-15", "reference_id": "mfsa2023-15", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-15" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-15/", "reference_id": "mfsa2023-15", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T15:43:12Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-15/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1806394", "reference_id": "show_bug.cgi?id=1806394", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T15:43:12Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1806394" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-29532" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f8c7-p8nz-bbap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62665?format=api", "vulnerability_id": "VCID-f8wd-xgwu-8kgm", "summary": "Canvas allows the use of the feDisplacementMap filter on images loaded cross-origin. The rendering by the filter is variable depending on the input pixel, allowing for timing attacks when the images are loaded from third party locations.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9077.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9077.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9077", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.38292", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.38295", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.38393", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.38356", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.38331", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.38379", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.38358", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.3843", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.38454", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.38318", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.38368", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.38376", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9077" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1298552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1298552" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-89/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-89/" }, { "reference_url": "http://www.securityfocus.com/bid/94337", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94337" }, { "reference_url": "http://www.securitytracker.com/id/1037298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037298" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395099", "reference_id": "1395099", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395099" }, { "reference_url": "https://security.archlinux.org/ASA-201611-16", "reference_id": "ASA-201611-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-16" }, { "reference_url": "https://security.archlinux.org/AVG-72", "reference_id": "AVG-72", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-72" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9077", "reference_id": "CVE-2016-9077", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9077" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89", "reference_id": "mfsa2016-89", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89" }, { "reference_url": "https://usn.ubuntu.com/3124-1/", "reference_id": "USN-3124-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3124-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9077" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f8wd-xgwu-8kgm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62658?format=api", "vulnerability_id": "VCID-fmub-ph5x-pbdu", "summary": "Redirection from an HTTP connection to a data: URL assigns the referring site's origin to the data: URL in some circumstances. This can result in same-origin violations against a domain if it loads resources from malicious sites. Cross-origin setting of cookies has been demonstrated without the ability to read them. *Note: This issue only affects Firefox 49 and 50.*", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9078", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01176", "scoring_system": "epss", "scoring_elements": "0.78742", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01176", "scoring_system": "epss", "scoring_elements": "0.78669", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01176", "scoring_system": "epss", "scoring_elements": "0.78745", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01176", "scoring_system": "epss", "scoring_elements": "0.78727", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01176", "scoring_system": "epss", "scoring_elements": "0.78719", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01176", "scoring_system": "epss", "scoring_elements": "0.78748", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01176", "scoring_system": "epss", "scoring_elements": "0.78746", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01176", "scoring_system": "epss", "scoring_elements": "0.78675", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01176", "scoring_system": "epss", "scoring_elements": "0.78706", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01176", "scoring_system": "epss", "scoring_elements": "0.78688", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01176", "scoring_system": "epss", "scoring_elements": "0.78714", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01176", "scoring_system": "epss", "scoring_elements": "0.78721", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9078" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1317641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1317641" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-91/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-91/" }, { "reference_url": "http://www.securityfocus.com/bid/94569", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94569" }, { "reference_url": "http://www.securitytracker.com/id/1037353", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037353" }, { "reference_url": "https://security.archlinux.org/ASA-201612-1", "reference_id": "ASA-201612-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201612-1" }, { "reference_url": "https://security.archlinux.org/AVG-90", "reference_id": "AVG-90", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-90" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:49.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:49.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:49.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:50.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:50.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:50.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9078", "reference_id": "CVE-2016-9078", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9078" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-91", "reference_id": "mfsa2016-91", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-91" }, { "reference_url": "https://usn.ubuntu.com/3140-1/", "reference_id": "USN-3140-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3140-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9078" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fmub-ph5x-pbdu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56660?format=api", "vulnerability_id": "VCID-fvp8-grcg-27d3", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2812.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2812.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2812", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70401", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70307", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70383", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70369", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70411", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.7042", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.7032", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70337", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70314", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70359", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70374", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70398", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2812" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1261776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1261776" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-42.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-42.html" }, { "reference_url": "http://www.securitytracker.com/id/1035692", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035692" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2936-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2936-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2936-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2936-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2936-3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2936-3" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330277", "reference_id": "1330277", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330277" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2812", "reference_id": "CVE-2016-2812", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2812" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2812", "reference_id": "CVE-2016-2812", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2812" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-42", "reference_id": "mfsa2016-42", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-42" }, { "reference_url": "https://usn.ubuntu.com/2936-1/", "reference_id": "USN-2936-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2936-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2812" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fvp8-grcg-27d3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63117?format=api", "vulnerability_id": "VCID-g2et-bnvt-9fem", "summary": "During the initialization of a new content process, a race condition occurs that can allow a content process to disclose heap addresses from the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17021.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17021.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17021", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64667", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64634", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.6467", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64681", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64553", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64607", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64635", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64593", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64641", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64657", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64674", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64662", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17021" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788725", "reference_id": "1788725", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788725" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-01", "reference_id": "mfsa2020-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-02", "reference_id": "mfsa2020-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-04", "reference_id": "mfsa2020-04", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-17021" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g2et-bnvt-9fem" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56657?format=api", "vulnerability_id": "VCID-gbsw-gmc4-uqad", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2811.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2811.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2811", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01744", "scoring_system": "epss", "scoring_elements": "0.8257", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01744", "scoring_system": "epss", "scoring_elements": "0.82457", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01744", "scoring_system": "epss", "scoring_elements": "0.82538", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01744", "scoring_system": "epss", "scoring_elements": "0.82534", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01744", "scoring_system": "epss", "scoring_elements": "0.82529", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01744", "scoring_system": "epss", "scoring_elements": "0.82566", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01744", "scoring_system": "epss", "scoring_elements": "0.82472", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01744", "scoring_system": "epss", "scoring_elements": "0.82489", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01744", "scoring_system": "epss", "scoring_elements": "0.82485", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01744", "scoring_system": "epss", "scoring_elements": "0.82512", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01744", "scoring_system": "epss", "scoring_elements": "0.82519", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2811" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1252330", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1252330" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-42.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-42.html" }, { "reference_url": "http://www.securitytracker.com/id/1035692", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035692" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2936-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2936-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2936-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2936-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2936-3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2936-3" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330275", "reference_id": "1330275", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330275" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2811", "reference_id": "CVE-2016-2811", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2811" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2811", "reference_id": "CVE-2016-2811", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2811" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-42", "reference_id": "mfsa2016-42", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-42" }, { "reference_url": "https://usn.ubuntu.com/2936-1/", "reference_id": "USN-2936-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2936-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2811" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gbsw-gmc4-uqad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56693?format=api", "vulnerability_id": "VCID-gqbc-wbhs-4bbx", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5256.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5256.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5256", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.82266", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.82373", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.82369", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.8237", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.82279", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.82298", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.82293", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.8232", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.82327", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.82347", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.82341", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.82335", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5256" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377666", "reference_id": "1377666", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377666" }, { "reference_url": "https://security.archlinux.org/ASA-201609-22", "reference_id": "ASA-201609-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201609-22" }, { "reference_url": "https://security.archlinux.org/AVG-24", "reference_id": "AVG-24", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-24" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-85", "reference_id": "mfsa2016-85", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-85" }, { "reference_url": "https://usn.ubuntu.com/3076-1/", "reference_id": "USN-3076-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3076-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5256" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gqbc-wbhs-4bbx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62656?format=api", "vulnerability_id": "VCID-gqhc-h5p7-dyh1", "summary": "Mozilla's add-ons SDK had a world-accessible resource with an HTML injection vulnerability. If an additional vulnerability allowed this resource to be loaded as a document it could allow injecting content and script into an add-on's context.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9903", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.7225", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72165", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72241", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72225", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72211", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72254", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72264", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72171", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72191", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72169", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72206", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72218", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9903" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1315435", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1315435" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:M/C:N/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-94/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-94/" }, { "reference_url": "http://www.securityfocus.com/bid/94883", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94883" }, { "reference_url": "http://www.securitytracker.com/id/1037461", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037461" }, { "reference_url": "https://security.archlinux.org/ASA-201612-15", "reference_id": "ASA-201612-15", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201612-15" }, { "reference_url": "https://security.archlinux.org/AVG-106", "reference_id": "AVG-106", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-106" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9903", "reference_id": "CVE-2016-9903", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9903" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-94", "reference_id": "mfsa2016-94", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-94" }, { "reference_url": "https://usn.ubuntu.com/3155-1/", "reference_id": "USN-3155-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3155-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9903" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gqhc-h5p7-dyh1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56681?format=api", "vulnerability_id": "VCID-gu5n-35b2-a3am", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2839.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2839.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2839", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00748", "scoring_system": "epss", "scoring_elements": "0.73044", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00748", "scoring_system": "epss", "scoring_elements": "0.7314", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00748", "scoring_system": "epss", "scoring_elements": "0.73102", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00748", "scoring_system": "epss", "scoring_elements": "0.73096", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00748", "scoring_system": "epss", "scoring_elements": "0.73139", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00748", "scoring_system": "epss", "scoring_elements": "0.73148", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00748", "scoring_system": "epss", "scoring_elements": "0.73053", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00748", "scoring_system": "epss", "scoring_elements": "0.73074", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00748", "scoring_system": "epss", "scoring_elements": "0.73048", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00748", "scoring_system": "epss", "scoring_elements": "0.73085", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00748", "scoring_system": "epss", "scoring_elements": "0.73098", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00748", "scoring_system": "epss", "scoring_elements": "0.73122", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2839" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1275339", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1275339" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-65.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-65.html" }, { "reference_url": "http://www.securityfocus.com/bid/92261", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92261" }, { "reference_url": "http://www.securitytracker.com/id/1036508", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036508" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3044-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3044-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361977", "reference_id": "1361977", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361977" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2839", "reference_id": "CVE-2016-2839", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2839" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2839", "reference_id": "CVE-2016-2839", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2839" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-65", "reference_id": "mfsa2016-65", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-65" }, { "reference_url": "https://usn.ubuntu.com/3044-1/", "reference_id": "USN-3044-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3044-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2839" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gu5n-35b2-a3am" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62891?format=api", "vulnerability_id": "VCID-hhtb-ha1v-tffj", "summary": "A memory corruption vulnerability in Skia that can occur when using transforms to make gradients, resulting in a potentially exploitable crash.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5377", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.83024", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82917", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82991", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82985", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82981", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.8302", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82934", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82946", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82943", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82968", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82975", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5377" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1306883", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1306883" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-01/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-01/" }, { "reference_url": "http://www.securityfocus.com/bid/95761", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/95761" }, { "reference_url": "http://www.securitytracker.com/id/1037693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037693" }, { "reference_url": "https://security.archlinux.org/ASA-201701-39", "reference_id": "ASA-201701-39", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-39" }, { "reference_url": "https://security.archlinux.org/AVG-157", "reference_id": "AVG-157", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-157" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5377", "reference_id": "CVE-2017-5377", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5377" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01", "reference_id": "mfsa2017-01", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01" }, { "reference_url": "https://usn.ubuntu.com/3175-1/", "reference_id": "USN-3175-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3175-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-5377" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hhtb-ha1v-tffj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63205?format=api", "vulnerability_id": "VCID-hhu1-cgcx-nfev", "summary": "During process shutdown, a document could have caused a use-after-free of a languages service object, leading to memory corruption and a potentially exploitable crash.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38498.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38498.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-38498", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50623", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50536", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50626", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50572", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50592", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50619", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72026", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72008", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71993", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72034", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72041", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-38498" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011099", "reference_id": "2011099", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011099" }, { "reference_url": "https://security.archlinux.org/AVG-2443", "reference_id": "AVG-2443", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2443" }, { "reference_url": "https://security.archlinux.org/AVG-2459", "reference_id": "AVG-2459", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2459" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-43", "reference_id": "mfsa2021-43", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-43" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-45", "reference_id": "mfsa2021-45", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-45" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-47", "reference_id": "mfsa2021-47", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-47" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3755", "reference_id": "RHSA-2021:3755", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3755" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3756", "reference_id": "RHSA-2021:3756", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3756" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3757", "reference_id": "RHSA-2021:3757", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3757" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3791", "reference_id": "RHSA-2021:3791", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3791" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3838", "reference_id": "RHSA-2021:3838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3838" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3839", "reference_id": "RHSA-2021:3839", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3839" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3840", "reference_id": "RHSA-2021:3840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3841", "reference_id": "RHSA-2021:3841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3841" }, { "reference_url": "https://usn.ubuntu.com/5107-1/", "reference_id": "USN-5107-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5107-1/" }, { "reference_url": "https://usn.ubuntu.com/5132-1/", "reference_id": "USN-5132-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5132-1/" }, { "reference_url": "https://usn.ubuntu.com/5248-1/", "reference_id": "USN-5248-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5248-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-38498" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hhu1-cgcx-nfev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62892?format=api", "vulnerability_id": "VCID-htpg-t39z-nbex", "summary": "Use-after-free vulnerability in Web Animations when interacting with cycle collection found through fuzzing.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5379", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82612", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82505", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82577", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82571", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82607", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82608", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82519", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82534", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82531", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82557", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82565", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82583", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5379" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1309198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1309198" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-01/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-01/" }, { "reference_url": "http://www.securityfocus.com/bid/95763", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/95763" }, { "reference_url": "http://www.securitytracker.com/id/1037693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037693" }, { "reference_url": "https://security.archlinux.org/ASA-201701-39", "reference_id": "ASA-201701-39", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-39" }, { "reference_url": "https://security.archlinux.org/AVG-157", "reference_id": "AVG-157", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-157" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5379", "reference_id": "CVE-2017-5379", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5379" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01", "reference_id": "mfsa2017-01", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01" }, { "reference_url": "https://usn.ubuntu.com/3175-1/", "reference_id": "USN-3175-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3175-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-5379" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-htpg-t39z-nbex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51393?format=api", "vulnerability_id": "VCID-j2ax-jb2h-byeu", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4052.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4052.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4052", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39393", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39484", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.395", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.3951", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39472", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39455", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39506", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39478", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39491", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39515", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39429", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4052" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228369", "reference_id": "2228369", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228369" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:38:55Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:38:55Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-33/", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:38:55Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-33/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1824420", "reference_id": "show_bug.cgi?id=1824420", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:38:55Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1824420" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-4052" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j2ax-jb2h-byeu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56637?format=api", "vulnerability_id": "VCID-j2ga-ggcd-fkg1", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0695.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0695.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1041.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1041.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2805.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2805.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2805", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00922", "scoring_system": "epss", "scoring_elements": "0.76008", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00922", "scoring_system": "epss", "scoring_elements": "0.75924", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00922", "scoring_system": "epss", "scoring_elements": "0.75988", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00922", "scoring_system": "epss", "scoring_elements": "0.75981", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00922", "scoring_system": "epss", "scoring_elements": "0.76021", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00922", "scoring_system": "epss", "scoring_elements": "0.76024", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00922", "scoring_system": "epss", "scoring_elements": "0.75928", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00922", "scoring_system": "epss", "scoring_elements": "0.7596", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00922", "scoring_system": "epss", "scoring_elements": "0.75939", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00922", "scoring_system": "epss", "scoring_elements": "0.75972", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00922", "scoring_system": "epss", "scoring_elements": "0.75986", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00922", "scoring_system": "epss", "scoring_elements": "0.76011", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2805" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1241731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1241731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2805", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2805" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2807", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2807" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2808", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2808" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2814" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3559", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3559" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3576", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3576" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-39.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-39.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "reference_url": "http://www.securitytracker.com/id/1035692", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035692" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2973-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2973-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330266", "reference_id": "1330266", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330266" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2805", "reference_id": "CVE-2016-2805", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2805" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-39", "reference_id": "mfsa2016-39", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-39" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0695", "reference_id": "RHSA-2016:0695", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0695" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1041", "reference_id": "RHSA-2016:1041", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1041" }, { "reference_url": "https://usn.ubuntu.com/2973-1/", "reference_id": "USN-2973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2805" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j2ga-ggcd-fkg1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62662?format=api", "vulnerability_id": "VCID-jvy8-w1m2-ayaw", "summary": "A use-after-free during web animations when working with timelines resulting in a potentially exploitable crash.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9068.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9068.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9068", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01719", "scoring_system": "epss", "scoring_elements": "0.82321", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01719", "scoring_system": "epss", "scoring_elements": "0.82431", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01719", "scoring_system": "epss", "scoring_elements": "0.82375", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01719", "scoring_system": "epss", "scoring_elements": "0.82382", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01719", "scoring_system": "epss", "scoring_elements": "0.82401", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01719", "scoring_system": "epss", "scoring_elements": "0.82397", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01719", "scoring_system": "epss", "scoring_elements": "0.82392", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01719", "scoring_system": "epss", "scoring_elements": "0.82426", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01719", "scoring_system": "epss", "scoring_elements": "0.82335", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01719", "scoring_system": "epss", "scoring_elements": "0.82353", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01719", "scoring_system": "epss", "scoring_elements": "0.82348", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9068" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1302973", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1302973" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-89/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-89/" }, { "reference_url": "http://www.securityfocus.com/bid/94337", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94337" }, { "reference_url": "http://www.securitytracker.com/id/1037298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037298" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396542", "reference_id": "1396542", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396542" }, { "reference_url": "https://security.archlinux.org/ASA-201611-16", "reference_id": "ASA-201611-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-16" }, { "reference_url": "https://security.archlinux.org/AVG-72", "reference_id": "AVG-72", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-72" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9068", "reference_id": "CVE-2016-9068", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9068" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89", "reference_id": "mfsa2016-89", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89" }, { "reference_url": "https://usn.ubuntu.com/3124-1/", "reference_id": "USN-3124-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3124-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9068" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jvy8-w1m2-ayaw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56744?format=api", "vulnerability_id": "VCID-jxq3-3gzd-yycp", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5294", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21786", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21911", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.2187", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21813", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21816", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21822", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21782", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21947", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.22001", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21766", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21843", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21899", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5294" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1246972", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1246972" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-89/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-89/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-90/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-90/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-93/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-93/" }, { "reference_url": "http://www.securityfocus.com/bid/94336", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94336" }, { "reference_url": "http://www.securitytracker.com/id/1037298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037298" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5294", "reference_id": "CVE-2016-5294", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5294" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89", "reference_id": "mfsa2016-89", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-90", "reference_id": "mfsa2016-90", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-90" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-93", "reference_id": "mfsa2016-93", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-93" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5294" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jxq3-3gzd-yycp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56685?format=api", "vulnerability_id": "VCID-k1u4-hqjh-zbc8", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5251.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5251.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5251", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67816", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67908", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67928", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67915", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67878", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67927", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.6784", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67859", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.6789", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00547", "scoring_system": "epss", "scoring_elements": "0.67904", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5251" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1255570", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1255570" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-66.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-66.html" }, { "reference_url": "http://www.securityfocus.com/bid/92260", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92260" }, { "reference_url": "http://www.securitytracker.com/id/1036508", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036508" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3044-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3044-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361978", "reference_id": "1361978", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361978" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5251", "reference_id": "CVE-2016-5251", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5251" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5251", "reference_id": "CVE-2016-5251", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5251" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-66", "reference_id": "mfsa2016-66", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-66" }, { "reference_url": "https://usn.ubuntu.com/3044-1/", "reference_id": "USN-3044-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3044-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5251" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k1u4-hqjh-zbc8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63496?format=api", "vulnerability_id": "VCID-k813-qahc-ubf4", "summary": "Security researcher Aral reported an out-of-bounds write when using\nthe ANGLE graphics library, which is used for WebGL content on Windows systems. This crash\noccurs due to improper size checking while writing to an array during some WebGL shader\noperations.\nThe ANGLE graphics library is only used on Windows. Linux, OS X, and\nAndroid operating systems are not affected by this vulnerability.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2824", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00696", "scoring_system": "epss", "scoring_elements": "0.71942", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00696", "scoring_system": "epss", "scoring_elements": "0.71874", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00696", "scoring_system": "epss", "scoring_elements": "0.71945", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00696", "scoring_system": "epss", "scoring_elements": "0.71928", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00696", "scoring_system": "epss", "scoring_elements": "0.71953", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00696", "scoring_system": "epss", "scoring_elements": "0.71957", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00696", "scoring_system": "epss", "scoring_elements": "0.71881", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00696", "scoring_system": "epss", "scoring_elements": "0.719", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00696", "scoring_system": "epss", "scoring_elements": "0.71872", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00696", "scoring_system": "epss", "scoring_elements": "0.71911", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00696", "scoring_system": "epss", "scoring_elements": "0.71922", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2824" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1248580", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1248580" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-53.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-53.html" }, { "reference_url": "http://www.securityfocus.com/bid/91075", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/91075" }, { "reference_url": "http://www.securitytracker.com/id/1036057", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036057" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2824", "reference_id": "CVE-2016-2824", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2824" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2824", "reference_id": "CVE-2016-2824", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2824" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-53", "reference_id": "mfsa2016-53", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-53" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2824" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k813-qahc-ubf4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51227?format=api", "vulnerability_id": "VCID-kr94-y6hg-d3hp", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6799.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6799.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6799", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64787", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64751", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64789", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64799", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64672", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64724", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64752", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.6471", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64758", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64773", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.6479", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64778", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6799" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801919", "reference_id": "1801919", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801919" }, { "reference_url": "https://security.gentoo.org/glsa/202003-02", "reference_id": "GLSA-202003-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-05", "reference_id": "mfsa2020-05", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-05" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-06", "reference_id": "mfsa2020-06", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-6799" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kr94-y6hg-d3hp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63116?format=api", "vulnerability_id": "VCID-krg2-d4vy-z7fu", "summary": "During the initialization of a new content process, a pointer offset can be manipulated leading to memory corruption and a potentially exploitable crash in the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17015.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17015.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17015", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00932", "scoring_system": "epss", "scoring_elements": "0.76148", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00932", "scoring_system": "epss", "scoring_elements": "0.7612", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00932", "scoring_system": "epss", "scoring_elements": "0.76161", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00932", "scoring_system": "epss", "scoring_elements": "0.76165", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00932", "scoring_system": "epss", "scoring_elements": "0.76061", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00932", "scoring_system": "epss", "scoring_elements": "0.76064", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00932", "scoring_system": "epss", "scoring_elements": "0.76096", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00932", "scoring_system": "epss", "scoring_elements": "0.76075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00932", "scoring_system": "epss", "scoring_elements": "0.76109", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00932", "scoring_system": "epss", "scoring_elements": "0.76122", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00932", "scoring_system": "epss", "scoring_elements": "0.76147", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00932", "scoring_system": "epss", "scoring_elements": "0.76123", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17015" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788722", "reference_id": "1788722", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788722" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-01", "reference_id": "mfsa2020-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-02", "reference_id": "mfsa2020-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-04", "reference_id": "mfsa2020-04", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-17015" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-krg2-d4vy-z7fu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56692?format=api", "vulnerability_id": "VCID-m2vr-a1ee-j7gv", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5255.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5255.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5255", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01098", "scoring_system": "epss", "scoring_elements": "0.77957", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01098", "scoring_system": "epss", "scoring_elements": "0.78041", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01098", "scoring_system": "epss", "scoring_elements": "0.78015", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01098", "scoring_system": "epss", "scoring_elements": "0.78013", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01098", "scoring_system": "epss", "scoring_elements": "0.78048", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01098", "scoring_system": "epss", "scoring_elements": "0.78047", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01098", "scoring_system": "epss", "scoring_elements": "0.77964", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01098", "scoring_system": "epss", "scoring_elements": "0.77993", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01098", "scoring_system": "epss", "scoring_elements": "0.77975", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01098", "scoring_system": "epss", "scoring_elements": "0.78001", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01098", "scoring_system": "epss", "scoring_elements": "0.78006", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01098", "scoring_system": "epss", "scoring_elements": "0.78033", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5255" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1212356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1212356" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-71.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-71.html" }, { "reference_url": "http://www.securityfocus.com/bid/92260", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92260" }, { "reference_url": "http://www.securitytracker.com/id/1036508", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036508" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3044-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3044-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361981", "reference_id": "1361981", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361981" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5255", "reference_id": "CVE-2016-5255", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5255" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5255", "reference_id": "CVE-2016-5255", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5255" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-71", "reference_id": "mfsa2016-71", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-71" }, { "reference_url": "https://usn.ubuntu.com/3044-1/", "reference_id": "USN-3044-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3044-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5255" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m2vr-a1ee-j7gv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62655?format=api", "vulnerability_id": "VCID-m5pb-75ag-tfep", "summary": "Use-after-free while manipulating the navigator object within WebVR. *Note: WebVR is not currently enabled by default.*", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9896", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01539", "scoring_system": "epss", "scoring_elements": "0.814", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01539", "scoring_system": "epss", "scoring_elements": "0.81299", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01539", "scoring_system": "epss", "scoring_elements": "0.81363", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01539", "scoring_system": "epss", "scoring_elements": "0.81384", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01539", "scoring_system": "epss", "scoring_elements": "0.81369", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01539", "scoring_system": "epss", "scoring_elements": "0.81361", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01539", "scoring_system": "epss", "scoring_elements": "0.81399", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01539", "scoring_system": "epss", "scoring_elements": "0.81308", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01539", "scoring_system": "epss", "scoring_elements": "0.8133", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01539", "scoring_system": "epss", "scoring_elements": "0.81329", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01539", "scoring_system": "epss", "scoring_elements": "0.81358", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9896" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1315543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1315543" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-94/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-94/" }, { "reference_url": "http://www.securityfocus.com/bid/94883", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94883" }, { "reference_url": "http://www.securitytracker.com/id/1037461", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037461" }, { "reference_url": "https://security.archlinux.org/ASA-201612-15", "reference_id": "ASA-201612-15", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201612-15" }, { "reference_url": "https://security.archlinux.org/AVG-106", "reference_id": "AVG-106", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-106" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9896", "reference_id": "CVE-2016-9896", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9896" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-94", "reference_id": "mfsa2016-94", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-94" }, { "reference_url": "https://usn.ubuntu.com/3155-1/", "reference_id": "USN-3155-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3155-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9896" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m5pb-75ag-tfep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63113?format=api", "vulnerability_id": "VCID-m92a-91pv-dffv", "summary": "If a user downloaded a file lacking an extension on Windows, and then \"Open\"-ed it from the downloads panel, if there was an executable file in the downloads directory with the same name but with an executable extension (such as .bat or .exe) that executable would have been launched instead.*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35112.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35112.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35112", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00532", "scoring_system": "epss", "scoring_elements": "0.67328", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00532", "scoring_system": "epss", "scoring_elements": "0.67318", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00532", "scoring_system": "epss", "scoring_elements": "0.67331", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00532", "scoring_system": "epss", "scoring_elements": "0.67351", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00532", "scoring_system": "epss", "scoring_elements": "0.67338", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00532", "scoring_system": "epss", "scoring_elements": "0.67303", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00532", "scoring_system": "epss", "scoring_elements": "0.6735", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00532", "scoring_system": "epss", "scoring_elements": "0.67228", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00532", "scoring_system": "epss", "scoring_elements": "0.67265", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00532", "scoring_system": "epss", "scoring_elements": "0.67289", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00532", "scoring_system": "epss", "scoring_elements": "0.67266", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908028", "reference_id": "1908028", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908028" }, { "reference_url": "https://security.archlinux.org/AVG-1364", "reference_id": "AVG-1364", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1364" }, { "reference_url": "https://security.archlinux.org/AVG-1366", "reference_id": "AVG-1366", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1366" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54", "reference_id": "mfsa2020-54", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-55", "reference_id": "mfsa2020-55", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-56", "reference_id": "mfsa2020-56", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-56" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-35112" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m92a-91pv-dffv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62675?format=api", "vulnerability_id": "VCID-mdpv-kcbb-9ubj", "summary": "Content Security Policy combined with HTTP to HTTPS redirection can be used by malicious server to verify whether a known site is within a user's browser history.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9071.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9071.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9071", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49208", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49279", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49288", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49261", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49266", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49313", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.4931", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49239", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49267", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49219", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49273", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49269", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9071" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1285003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1285003" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-89/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-89/" }, { "reference_url": "http://www.securityfocus.com/bid/94337", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94337" }, { "reference_url": "http://www.securitytracker.com/id/1037298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037298" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395100", "reference_id": "1395100", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395100" }, { "reference_url": "https://security.archlinux.org/ASA-201611-16", "reference_id": "ASA-201611-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-16" }, { "reference_url": "https://security.archlinux.org/AVG-72", "reference_id": "AVG-72", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-72" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9071", "reference_id": "CVE-2016-9071", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9071" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89", "reference_id": "mfsa2016-89", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89" }, { "reference_url": "https://usn.ubuntu.com/3124-1/", "reference_id": "USN-3124-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3124-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9071" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mdpv-kcbb-9ubj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33966?format=api", "vulnerability_id": "VCID-mp4n-ez8p-63ek", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28163.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28163.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28163", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47933", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47978", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47901", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47984", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47929", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.4792", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47942", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47918", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47923", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47871", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28163" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178468", "reference_id": "2178468", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178468" }, { "reference_url": "https://security.gentoo.org/glsa/202305-35", "reference_id": "GLSA-202305-35", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202305-35" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-09", "reference_id": "mfsa2023-09", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-09" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-09/", "reference_id": "mfsa2023-09", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:17:13Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-09/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-10", "reference_id": "mfsa2023-10", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-10" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-10/", "reference_id": "mfsa2023-10", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:17:13Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-10/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-11", "reference_id": "mfsa2023-11", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-11" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-11/", "reference_id": "mfsa2023-11", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:17:13Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-11/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1817768", "reference_id": "show_bug.cgi?id=1817768", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:17:13Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1817768" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-28163" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mp4n-ez8p-63ek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35228?format=api", "vulnerability_id": "VCID-mqte-f1hw-2ya5", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22753.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22753.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-22753", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61418", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61435", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61345", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61431", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61393", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61412", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61427", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61405", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.6139", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61374", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61343", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-22753" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053241", "reference_id": "2053241", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053241" }, { "reference_url": "https://security.gentoo.org/glsa/202202-03", "reference_id": "GLSA-202202-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202202-03" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-04", "reference_id": "mfsa2022-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-04/", "reference_id": "mfsa2022-04", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:47:11Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-04/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-05", "reference_id": "mfsa2022-05", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-05" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-05/", "reference_id": "mfsa2022-05", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:47:11Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-05/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-06", "reference_id": "mfsa2022-06", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-06" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-06/", "reference_id": "mfsa2022-06", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:47:11Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-06/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1732435", "reference_id": "show_bug.cgi?id=1732435", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:47:11Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1732435" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-22753" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mqte-f1hw-2ya5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63189?format=api", "vulnerability_id": "VCID-mtkx-1vvb-3yhp", "summary": "In the Angle graphics library, depth pitch computations did not take into account the block size and simply multiplied the row pitch with the pixel height. This caused the load functions to use a very high depth pitch, reading past the end of the user-supplied buffer.*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16048.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16048.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16048", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41395", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41486", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41513", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.4144", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.4149", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41498", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41518", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41472", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41517", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41489", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41416", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16048" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926979", "reference_id": "1926979", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926979" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-06", "reference_id": "mfsa2021-06", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-16048" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mtkx-1vvb-3yhp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51567?format=api", "vulnerability_id": "VCID-mwrr-ashj-bfg3", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird,\n the worst of which could lead to the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7825.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7825.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7825", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.82371", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.82318", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.82325", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.82345", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.82339", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.82333", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.82367", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.82368", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.82264", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.82277", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.82296", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0171", "scoring_system": "epss", "scoring_elements": "0.82291", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7825" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1390980", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1390980" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1393624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1393624" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:N" }, { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-21/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-21/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-22/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-22/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-23/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-23/" }, { "reference_url": "http://www.securityfocus.com/bid/101059", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101059" }, { "reference_url": "http://www.securitytracker.com/id/1039465", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1039465" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1496657", "reference_id": "1496657", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1496657" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7825", "reference_id": "CVE-2017-7825", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7825" }, { "reference_url": "https://security.gentoo.org/glsa/201803-14", "reference_id": "GLSA-201803-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201803-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-21", "reference_id": "mfsa2017-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-21" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-22", "reference_id": "mfsa2017-22", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-22" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-23", "reference_id": "mfsa2017-23", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-23" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-7825" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mwrr-ashj-bfg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63280?format=api", "vulnerability_id": "VCID-myv9-89b8-w7dm", "summary": "In the Windows 10 April 2018 Update, Windows Defender SmartScreen honors the SEE_MASK_FLAG_NO_UI flag associated with downloaded files and will not show any UI. Files that are unknown and potentially dangerous will be allowed to run because SmartScreen will not prompt the user for a decision, and if the user is offline all files will be allowed to be opened because Windows won’t prompt the user to ask what to do. Firefox incorrectly sets this flag when downloading files, leading to less secure behavior from SmartScreen. *Note: this issue only affects Windows 10 users running the April 2018 update or later. It does not affect other Windows users or other operating systems.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5174.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5174.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5174", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67633", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67632", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67654", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.6764", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67608", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67642", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67531", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67567", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67589", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67618", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5174" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1447080", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1447080" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2018-11/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2018-11/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2018-12/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2018-12/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2018-13/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2018-13/" }, { "reference_url": "http://www.securityfocus.com/bid/104136", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104136" }, { "reference_url": "http://www.securitytracker.com/id/1040896", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1040896" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576274", "reference_id": "1576274", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576274" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5174", "reference_id": "CVE-2018-5174", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5174" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-11", "reference_id": "mfsa2018-11", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-11" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-12", "reference_id": "mfsa2018-12", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-12" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-13", "reference_id": "mfsa2018-13", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-13" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-5174" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-myv9-89b8-w7dm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63009?format=api", "vulnerability_id": "VCID-n8hk-44ah-bugr", "summary": "Due to insufficient escaping of the ampersand character in the \"copy as cURL\" feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system.*This bug only affects Firefox for Windows. Other versions of Firefox are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4084.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4084.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-4084", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51739", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.5165", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.5175", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.517", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.5169", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51704", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51664", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51759", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51752", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51711", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51728", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-4084" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362911", "reference_id": "2362911", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362911" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1949994%2C1956698%2C1960198", "reference_id": "buglist.cgi?bug_id=1949994%2C1956698%2C1960198", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-30T03:56:30Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1949994%2C1956698%2C1960198" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-29", "reference_id": "mfsa2025-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-29/", "reference_id": "mfsa2025-29", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-30T03:56:30Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-30", "reference_id": "mfsa2025-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-30/", "reference_id": "mfsa2025-30", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-30T03:56:30Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-32", "reference_id": "mfsa2025-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-32" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-32/", "reference_id": "mfsa2025-32", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-30T03:56:30Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-32/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-4084" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n8hk-44ah-bugr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62841?format=api", "vulnerability_id": "VCID-ngw4-xb6d-gqfm", "summary": "An integer overflow in createImageBitmap() was reported through the Pwn2Own contest. The fix for this vulnerability disables the experimental extensions to the createImageBitmap API. This function runs in the content sandbox, requiring a second vulnerability to compromise a user's computer.", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0558.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0558.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5428.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5428.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5428", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58778", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58897", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58918", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.589", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58881", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58914", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58919", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58852", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58875", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58843", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58895", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58901", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5428" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1348168", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1348168" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-08/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-08/" }, { "reference_url": "http://www.securityfocus.com/bid/96959", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/96959" }, { "reference_url": "http://www.securitytracker.com/id/1038060", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1038060" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1433202", "reference_id": "1433202", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1433202" }, { "reference_url": "https://security.archlinux.org/ASA-201703-15", "reference_id": "ASA-201703-15", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201703-15" }, { "reference_url": "https://security.archlinux.org/AVG-219", "reference_id": "AVG-219", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-219" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5428", "reference_id": "CVE-2017-5428", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5428" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-08", "reference_id": "mfsa2017-08", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0558", "reference_id": "RHSA-2017:0558", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0558" }, { "reference_url": "https://usn.ubuntu.com/3238-1/", "reference_id": "USN-3238-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3238-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-5428" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ngw4-xb6d-gqfm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56670?format=api", "vulnerability_id": "VCID-p365-j5gq-4uct", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2816.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2816.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2816", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47881", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47811", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47869", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47879", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47933", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47927", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47849", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47871", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47819", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47872", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47868", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47892", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2816" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1223743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1223743" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-45.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-45.html" }, { "reference_url": "http://www.securitytracker.com/id/1035692", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035692" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2936-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2936-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2936-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2936-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2936-3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2936-3" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330282", "reference_id": "1330282", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330282" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2816", "reference_id": "CVE-2016-2816", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2816" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2816", "reference_id": "CVE-2016-2816", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2816" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-45", "reference_id": "mfsa2016-45", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-45" }, { "reference_url": "https://usn.ubuntu.com/2936-1/", "reference_id": "USN-2936-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2936-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2816" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p365-j5gq-4uct" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/145615?format=api", "vulnerability_id": "VCID-p595-z1gu-6fgf", "summary": "Mozilla Firefox before 25 allows modification of anonymous content of pluginProblem.xml binding", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5594", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49849", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49885", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49914", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49864", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49919", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49911", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.4993", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49902", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49903", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49949", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49922", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5594" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-5594" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p595-z1gu-6fgf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62886?format=api", "vulnerability_id": "VCID-pber-bzw2-r3gw", "summary": "The Mozilla Maintenance Service can be invoked by an unprivileged user to read 32 bytes of any arbitrary file on the local system by convincing the service that it is reading a status file provided by the Mozilla Windows Updater. The Mozilla Maintenance Service executes with privileged access, bypassing system protections against unprivileged users. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7768", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14212", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14306", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.1425", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14141", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14138", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14302", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14387", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14453", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14259", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14342", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14398", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14346", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7768" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1336979", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1336979" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-15/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-15/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-16/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-16/" }, { "reference_url": "http://www.securityfocus.com/bid/99057", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/99057" }, { "reference_url": "http://www.securitytracker.com/id/1038689", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1038689" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7768", "reference_id": "CVE-2017-7768", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7768" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-15", "reference_id": "mfsa2017-15", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-16", "reference_id": "mfsa2017-16", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-7768" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pber-bzw2-r3gw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62916?format=api", "vulnerability_id": "VCID-pn68-e9g7-qbf1", "summary": "The executable file warning did not warn users before opening files with the terminal extension. *This bug only affects Thunderbird for macOS. Other versions of Thunderbird are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6426.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6426.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-6426", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12839", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12989", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12968", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12918", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.13039", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14109", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13899", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13908", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14014", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14068", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33771", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-6426" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374560", "reference_id": "2374560", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374560" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-51", "reference_id": "mfsa2025-51", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-51" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-51/", "reference_id": "mfsa2025-51", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-25T14:21:30Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-51/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-53", "reference_id": "mfsa2025-53", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-53" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-53/", "reference_id": "mfsa2025-53", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-25T14:21:30Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-53/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-54", "reference_id": "mfsa2025-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-54" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-54/", "reference_id": "mfsa2025-54", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-25T14:21:30Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-54/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-55", "reference_id": "mfsa2025-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-55" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-55/", "reference_id": "mfsa2025-55", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-25T14:21:30Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-55/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1964385", "reference_id": "show_bug.cgi?id=1964385", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-25T14:21:30Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1964385" }, { "reference_url": "https://usn.ubuntu.com/7663-1/", "reference_id": "USN-7663-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7663-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-6426" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pn68-e9g7-qbf1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51403?format=api", "vulnerability_id": "VCID-pv9q-fcta-ffbq", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4577.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4577.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4577", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27915", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28025", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28067", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28073", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.2803", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27973", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27981", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27963", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28118", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28161", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27958", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4577" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236075", "reference_id": "2236075", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236075" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-34/", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:33Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-36/", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:33Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-36/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-38/", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:33Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4945", "reference_id": "RHSA-2023:4945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4946", "reference_id": "RHSA-2023:4946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4947", "reference_id": "RHSA-2023:4947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4948", "reference_id": "RHSA-2023:4948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4949", "reference_id": "RHSA-2023:4949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4950", "reference_id": "RHSA-2023:4950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4951", "reference_id": "RHSA-2023:4951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4952", "reference_id": "RHSA-2023:4952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4954", "reference_id": "RHSA-2023:4954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4955", "reference_id": "RHSA-2023:4955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4956", "reference_id": "RHSA-2023:4956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4957", "reference_id": "RHSA-2023:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4958", "reference_id": "RHSA-2023:4958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4959", "reference_id": "RHSA-2023:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5019", "reference_id": "RHSA-2023:5019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5019" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1847397", "reference_id": "show_bug.cgi?id=1847397", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:33Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1847397" }, { "reference_url": "https://usn.ubuntu.com/6320-1/", "reference_id": "USN-6320-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6320-1/" }, { "reference_url": "https://usn.ubuntu.com/6405-1/", "reference_id": "USN-6405-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6405-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922200?format=api", "purl": "pkg:deb/debian/firefox-esr@115.2.0esr-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.2.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-4577" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pv9q-fcta-ffbq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62661?format=api", "vulnerability_id": "VCID-pybp-xzy7-q3a8", "summary": "Two use-after-free errors during DOM operations resulting in potentially exploitable crashes.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9067.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9067.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9067", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80097", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80175", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80147", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80166", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.8015", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80142", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80172", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80104", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80124", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80112", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.8014", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9067" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1301777", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1301777" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1308922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1308922" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-89/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-89/" }, { "reference_url": "http://www.securityfocus.com/bid/94337", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94337" }, { "reference_url": "http://www.securitytracker.com/id/1037298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037298" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396539", "reference_id": "1396539", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396539" }, { "reference_url": "https://security.archlinux.org/ASA-201611-16", "reference_id": "ASA-201611-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-16" }, { "reference_url": "https://security.archlinux.org/AVG-72", "reference_id": "AVG-72", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-72" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9067", "reference_id": "CVE-2016-9067", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9067" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89", "reference_id": "mfsa2016-89", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89" }, { "reference_url": "https://usn.ubuntu.com/3124-1/", "reference_id": "USN-3124-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3124-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9067" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pybp-xzy7-q3a8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56738?format=api", "vulnerability_id": "VCID-q38n-z9wb-qufk", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5283.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5283.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5283", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50855", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50978", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50992", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50999", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50913", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50939", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50896", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50953", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50951", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50993", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50971", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50955", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5283" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377670", "reference_id": "1377670", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377670" }, { "reference_url": "https://security.archlinux.org/ASA-201609-22", "reference_id": "ASA-201609-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201609-22" }, { "reference_url": "https://security.archlinux.org/AVG-24", "reference_id": "AVG-24", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-24" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-85", "reference_id": "mfsa2016-85", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-85" }, { "reference_url": "https://usn.ubuntu.com/3076-1/", "reference_id": "USN-3076-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3076-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5283" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q38n-z9wb-qufk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63190?format=api", "vulnerability_id": "VCID-q77k-hc9g-9fhm", "summary": "The Mozilla Maintenance Service granted SERVICE_START access to BUILTIN|Users which, in a domain network, grants normal remote users access to start or stop the service. This could be used to prevent the browser update service from operating (if an attacker spammed the 'Stop' command); but also exposed attack surface in the maintenance service.*Note: This issue only affected Windows operating systems older than Win 10 build 1709. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29951.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29951.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29951", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67298", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.6732", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67307", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67271", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67306", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67319", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67198", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67235", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67259", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67236", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67287", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.673", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29951" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961505", "reference_id": "1961505", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961505" }, { "reference_url": "https://security.archlinux.org/AVG-1914", "reference_id": "AVG-1914", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1914" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-10", "reference_id": "mfsa2021-10", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-18", "reference_id": "mfsa2021-18", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-18" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-19", "reference_id": "mfsa2021-19", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-19" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-29951" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q77k-hc9g-9fhm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63487?format=api", "vulnerability_id": "VCID-qa9c-xyvd-kygu", "summary": "Mozilla developer John Schoenick reported that CSS pseudo-classes can\nbe used by web content to leak information on plugins that are installed but disabled.\nThis can be used for information disclosure through a fingerprinting attack that lists all\nof the plugins installed by a user on a system, even when they are disabled.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2832.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2832.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2832", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62275", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62126", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.6226", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62238", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62283", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.6229", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62187", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62218", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62185", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62235", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62252", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.6227", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2832" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1025267", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1025267" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-59.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-59.html" }, { "reference_url": "http://www.securitytracker.com/id/1036057", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036057" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2993-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2993-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1342899", "reference_id": "1342899", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1342899" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2832", "reference_id": "CVE-2016-2832", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2832" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2832", "reference_id": "CVE-2016-2832", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2832" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-59", "reference_id": "mfsa2016-59", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-59" }, { "reference_url": "https://usn.ubuntu.com/2993-1/", "reference_id": "USN-2993-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2993-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2832" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qa9c-xyvd-kygu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62899?format=api", "vulnerability_id": "VCID-qjs9-h3tt-qucf", "summary": "Special about: pages used by web content, such as RSS feeds, can load privileged about: pages in an iframe. If a content-injection bug were found in one of those pages this could allow for potential privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5391", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02446", "scoring_system": "epss", "scoring_elements": "0.85213", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02446", "scoring_system": "epss", "scoring_elements": "0.85119", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02446", "scoring_system": "epss", "scoring_elements": "0.85196", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02446", "scoring_system": "epss", "scoring_elements": "0.85194", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02446", "scoring_system": "epss", "scoring_elements": "0.85191", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02446", "scoring_system": "epss", "scoring_elements": "0.85212", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02446", "scoring_system": "epss", "scoring_elements": "0.85132", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02446", "scoring_system": "epss", "scoring_elements": "0.85149", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02446", "scoring_system": "epss", "scoring_elements": "0.85152", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02446", "scoring_system": "epss", "scoring_elements": "0.85174", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02446", "scoring_system": "epss", "scoring_elements": "0.85182", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5391" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1309310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1309310" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-01/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-01/" }, { "reference_url": "http://www.securityfocus.com/bid/95763", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/95763" }, { "reference_url": "http://www.securitytracker.com/id/1037693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037693" }, { "reference_url": "https://security.archlinux.org/ASA-201701-39", "reference_id": "ASA-201701-39", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-39" }, { "reference_url": "https://security.archlinux.org/AVG-157", "reference_id": "AVG-157", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-157" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5391", "reference_id": "CVE-2017-5391", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5391" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01", "reference_id": "mfsa2017-01", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01" }, { "reference_url": "https://usn.ubuntu.com/3175-1/", "reference_id": "USN-3175-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3175-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-5391" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qjs9-h3tt-qucf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56724?format=api", "vulnerability_id": "VCID-qrbp-3x9q-q3g2", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5273.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5273.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5273", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00691", "scoring_system": "epss", "scoring_elements": "0.7175", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00691", "scoring_system": "epss", "scoring_elements": "0.7182", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00691", "scoring_system": "epss", "scoring_elements": "0.71832", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00691", "scoring_system": "epss", "scoring_elements": "0.71838", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00691", "scoring_system": "epss", "scoring_elements": "0.71757", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00691", "scoring_system": "epss", "scoring_elements": "0.71776", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00691", "scoring_system": "epss", "scoring_elements": "0.71789", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00691", "scoring_system": "epss", "scoring_elements": "0.718", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00691", "scoring_system": "epss", "scoring_elements": "0.71824", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00691", "scoring_system": "epss", "scoring_elements": "0.71807", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5273" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377669", "reference_id": "1377669", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377669" }, { "reference_url": "https://security.archlinux.org/ASA-201609-22", "reference_id": "ASA-201609-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201609-22" }, { "reference_url": "https://security.archlinux.org/AVG-24", "reference_id": "AVG-24", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-24" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-85", "reference_id": "mfsa2016-85", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-85" }, { "reference_url": "https://usn.ubuntu.com/3076-1/", "reference_id": "USN-3076-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3076-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5273" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qrbp-3x9q-q3g2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56737?format=api", "vulnerability_id": "VCID-qrqw-p9v1-zfb2", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5282.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5282.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5282", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.6016", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60319", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60324", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60331", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60237", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60262", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.6023", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.6028", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60295", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60315", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60302", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60284", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5282" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377675", "reference_id": "1377675", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377675" }, { "reference_url": "https://security.archlinux.org/ASA-201609-22", "reference_id": "ASA-201609-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201609-22" }, { "reference_url": "https://security.archlinux.org/AVG-24", "reference_id": "AVG-24", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-24" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-85", "reference_id": "mfsa2016-85", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-85" }, { "reference_url": "https://usn.ubuntu.com/3076-1/", "reference_id": "USN-3076-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3076-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5282" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qrqw-p9v1-zfb2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63475?format=api", "vulnerability_id": "VCID-qu9b-rst3-v7fa", "summary": "Security researcher Frédéric Hoguin reported a mechanism where the\nMozilla Windows updater could be used to overwrite arbitrary files. He found that files\nextracted by the updater from a MAR archive are not locked for writing and\ncan be overwritten by other processes while the updater is running. A malicious local\nprogram could invoke the updater and then interfere with the extracted files, replacing\nthem with its own. This vulnerability could be used for privilege escalation if these\noverwritten files were later invoked by other Windows components that had higher\nprivileges. \nThis issue does not affect non-Windows operating systems.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2826", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16615", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16589", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16688", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16631", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16568", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16576", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16769", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16826", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16612", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16697", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16751", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16731", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2826" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1237219", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1237219" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-55.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-55.html" }, { "reference_url": "http://www.securityfocus.com/bid/91075", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/91075" }, { "reference_url": "http://www.securitytracker.com/id/1036057", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036057" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2826", "reference_id": "CVE-2016-2826", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2826" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2826", "reference_id": "CVE-2016-2826", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2826" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-55", "reference_id": "mfsa2016-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-55" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2826" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qu9b-rst3-v7fa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33669?format=api", "vulnerability_id": "VCID-qv7a-3c41-x3cr", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38477.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38477.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38477", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.4189", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41961", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41988", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41952", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41939", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41953", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41991", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41967", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41956", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41979", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41906", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38477" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2120695", "reference_id": "2120695", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2120695" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1760611%2C1770219%2C1771159%2C1773363", "reference_id": "buglist.cgi?bug_id=1760611%2C1770219%2C1771159%2C1773363", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:21:30Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1760611%2C1770219%2C1771159%2C1773363" }, { "reference_url": "https://security.gentoo.org/glsa/202208-37", "reference_id": "GLSA-202208-37", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-37" }, { "reference_url": "https://security.gentoo.org/glsa/202208-38", "reference_id": "GLSA-202208-38", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-38" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-33", "reference_id": "mfsa2022-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-33/", "reference_id": "mfsa2022-33", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:21:30Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-33/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-34", "reference_id": "mfsa2022-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-34/", "reference_id": "mfsa2022-34", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:21:30Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-36", "reference_id": "mfsa2022-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-36/", "reference_id": "mfsa2022-36", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:21:30Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-36/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6164", "reference_id": "RHSA-2022:6164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6165", "reference_id": "RHSA-2022:6165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6166", "reference_id": "RHSA-2022:6166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6167", "reference_id": "RHSA-2022:6167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6168", "reference_id": "RHSA-2022:6168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6169", "reference_id": "RHSA-2022:6169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6174", "reference_id": "RHSA-2022:6174", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6174" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6175", "reference_id": "RHSA-2022:6175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6176", "reference_id": "RHSA-2022:6176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6177", "reference_id": "RHSA-2022:6177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6177" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6178", "reference_id": "RHSA-2022:6178", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6178" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6179", "reference_id": "RHSA-2022:6179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6179" }, { "reference_url": "https://usn.ubuntu.com/5581-1/", "reference_id": "USN-5581-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5581-1/" }, { "reference_url": "https://usn.ubuntu.com/5663-1/", "reference_id": "USN-5663-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5663-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922173?format=api", "purl": "pkg:deb/debian/firefox-esr@102.2.0esr-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@102.2.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-38477" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qv7a-3c41-x3cr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62811?format=api", "vulnerability_id": "VCID-qw5k-tgdz-vkcw", "summary": "The Mozilla Windows updater can be called by a non-privileged user to delete an arbitrary local file by passing a special path to the callback parameter through the Mozilla Maintenance Service, which has privileged access. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5409", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29143", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29285", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29238", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29186", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29213", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29188", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.2924", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29314", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29362", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29175", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29239", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29279", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5409" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1321814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1321814" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.5", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-05/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-05/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-06/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-06/" }, { "reference_url": "http://www.securityfocus.com/bid/96696", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/96696" }, { "reference_url": "http://www.securitytracker.com/id/1037966", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037966" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5409", "reference_id": "CVE-2017-5409", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:P/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5409" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-05", "reference_id": "mfsa2017-05", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-05" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-06", "reference_id": "mfsa2017-06", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-5409" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qw5k-tgdz-vkcw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56636?format=api", "vulnerability_id": "VCID-qwc9-da7w-4kdr", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2804.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2804.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2804", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00941", "scoring_system": "epss", "scoring_elements": "0.76275", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00941", "scoring_system": "epss", "scoring_elements": "0.76184", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00941", "scoring_system": "epss", "scoring_elements": "0.76274", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00941", "scoring_system": "epss", "scoring_elements": "0.76251", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00941", "scoring_system": "epss", "scoring_elements": "0.76288", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00941", "scoring_system": "epss", "scoring_elements": "0.76292", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00941", "scoring_system": "epss", "scoring_elements": "0.76189", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00941", "scoring_system": "epss", "scoring_elements": "0.76222", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00941", "scoring_system": "epss", "scoring_elements": "0.76202", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00941", "scoring_system": "epss", "scoring_elements": "0.76234", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00941", "scoring_system": "epss", "scoring_elements": "0.76247", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2804" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1141382", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1141382" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1155328", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1155328" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1229855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1229855" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1240880", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1240880" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1249183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1249183" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1255298", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1255298" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-39.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-39.html" }, { "reference_url": "http://www.securitytracker.com/id/1035692", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035692" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2936-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2936-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2936-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2936-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2936-3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2936-3" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330260", "reference_id": "1330260", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330260" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:38.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2804", "reference_id": "CVE-2016-2804", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2804" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2804", "reference_id": "CVE-2016-2804", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2804" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-39", "reference_id": "mfsa2016-39", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-39" }, { "reference_url": "https://usn.ubuntu.com/2936-1/", "reference_id": "USN-2936-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2936-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2804" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qwc9-da7w-4kdr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63499?format=api", "vulnerability_id": "VCID-qzrz-4abn-q7f2", "summary": "Security researcher Armin Ebert reported that the\nlocation.host property can be set to an arbitrary string after creating an\ninvalid data: URI. This allows for a bypass of some same-origin policy\nprotections. This issue is mitigated by the data: URI in use and any\nsame-origin checks for http: or https: are still enforced\ncorrectly. As a result cookie stealing and other common same-origin bypass attacks are not\npossible.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2825.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2825.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2825", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66908", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66805", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.6691", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66878", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66911", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66926", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66843", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66869", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66841", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.6689", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66904", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66924", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2825" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1193093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1193093" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-54.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-54.html" }, { "reference_url": "http://www.securitytracker.com/id/1036057", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036057" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2993-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2993-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1342894", "reference_id": "1342894", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1342894" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2825", "reference_id": "CVE-2016-2825", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2825" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2825", "reference_id": "CVE-2016-2825", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2825" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-54", "reference_id": "mfsa2016-54", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-54" }, { "reference_url": "https://usn.ubuntu.com/2993-1/", "reference_id": "USN-2993-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2993-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2825" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qzrz-4abn-q7f2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62895?format=api", "vulnerability_id": "VCID-r34s-64j2-dfff", "summary": "Feed preview for RSS feeds can be used to capture errors and exceptions generated by privileged content, allowing for the exposure of internal information not meant to be seen by web content.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5382", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76477", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76388", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76451", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76446", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76486", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.7649", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76392", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.7642", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76402", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76434", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76448", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76473", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5382" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1295322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1295322" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-01/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-01/" }, { "reference_url": "http://www.securityfocus.com/bid/95763", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/95763" }, { "reference_url": "http://www.securitytracker.com/id/1037693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037693" }, { "reference_url": "https://security.archlinux.org/ASA-201701-39", "reference_id": "ASA-201701-39", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-39" }, { "reference_url": "https://security.archlinux.org/AVG-157", "reference_id": "AVG-157", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-157" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5382", "reference_id": "CVE-2017-5382", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5382" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01", "reference_id": "mfsa2017-01", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01" }, { "reference_url": "https://usn.ubuntu.com/3175-1/", "reference_id": "USN-3175-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3175-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-5382" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r34s-64j2-dfff" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62897?format=api", "vulnerability_id": "VCID-r7te-y4n3-1uhj", "summary": "Data sent with in multipart channels, such as the multipart/x-mixed-replace MIME type, will ignore the referrer-policy response header, leading to potential information disclosure for sites using this header.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5385", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00947", "scoring_system": "epss", "scoring_elements": "0.76358", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00947", "scoring_system": "epss", "scoring_elements": "0.76269", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00947", "scoring_system": "epss", "scoring_elements": "0.76334", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00947", "scoring_system": "epss", "scoring_elements": "0.7633", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00947", "scoring_system": "epss", "scoring_elements": "0.7637", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00947", "scoring_system": "epss", "scoring_elements": "0.76375", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00947", "scoring_system": "epss", "scoring_elements": "0.76273", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00947", "scoring_system": "epss", "scoring_elements": "0.76303", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00947", "scoring_system": "epss", "scoring_elements": "0.76283", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00947", "scoring_system": "epss", "scoring_elements": "0.76316", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00947", "scoring_system": "epss", "scoring_elements": "0.76329", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00947", "scoring_system": "epss", "scoring_elements": "0.76356", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5385" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1295945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1295945" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-01/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-01/" }, { "reference_url": "http://www.securityfocus.com/bid/95763", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/95763" }, { "reference_url": "http://www.securitytracker.com/id/1037693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037693" }, { "reference_url": "https://security.archlinux.org/ASA-201701-39", "reference_id": "ASA-201701-39", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-39" }, { "reference_url": "https://security.archlinux.org/AVG-157", "reference_id": "AVG-157", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-157" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5385", "reference_id": "CVE-2017-5385", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5385" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01", "reference_id": "mfsa2017-01", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01" }, { "reference_url": "https://usn.ubuntu.com/3175-1/", "reference_id": "USN-3175-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3175-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-5385" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r7te-y4n3-1uhj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56676?format=api", "vulnerability_id": "VCID-r8jw-hvmm-pkhs", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2835.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2835.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2835", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.68914", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.69011", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.6901", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.68981", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.69022", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.69031", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.68932", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.68952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.68982", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.69001", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.69025", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2835" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1222101", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1222101" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1251308", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1251308" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1254106", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1254106" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1264998", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1264998" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1270537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1270537" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1275582", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1275582" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1280215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1280215" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1280443", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1280443" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1282246", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1282246" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-62.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-62.html" }, { "reference_url": "http://www.securityfocus.com/bid/92261", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92261" }, { "reference_url": "http://www.securitytracker.com/id/1036508", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036508" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3044-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3044-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361975", "reference_id": "1361975", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361975" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2835", "reference_id": "CVE-2016-2835", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2835" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2835", "reference_id": "CVE-2016-2835", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2835" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-62", "reference_id": "mfsa2016-62", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-62" }, { "reference_url": "https://usn.ubuntu.com/3044-1/", "reference_id": "USN-3044-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3044-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2835" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r8jw-hvmm-pkhs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63165?format=api", "vulnerability_id": "VCID-rakk-h5vn-kbaw", "summary": "Given an installed malicious file picker application, an attacker was able to steal and upload local files of their choosing, regardless of the actually files picked.\n*Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15649.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15649.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15649", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47465", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47495", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47516", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47519", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47538", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47514", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47522", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47581", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47574", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47525", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15649" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870408", "reference_id": "1870408", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870408" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-31", "reference_id": "mfsa2020-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-31" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-15649" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rakk-h5vn-kbaw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63437?format=api", "vulnerability_id": "VCID-rsy6-acfe-ffb5", "summary": "The constructed curl command from the \"Copy as curl\" feature in DevTools was not properly escaped for PowerShell. This could have lead to command injection if pasted into a Powershell prompt.*This bug only affects Firefox for Windows. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22744.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22744.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-22744", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63349", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63371", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63302", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63363", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63329", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63382", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63365", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63347", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.6333", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63296", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-22744" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039571", "reference_id": "2039571", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039571" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-01", "reference_id": "mfsa2022-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-01/", "reference_id": "mfsa2022-01", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T15:10:40Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-02", "reference_id": "mfsa2022-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-02/", "reference_id": "mfsa2022-02", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T15:10:40Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-03", "reference_id": "mfsa2022-03", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-03" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-03/", "reference_id": "mfsa2022-03", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T15:10:40Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-03/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1737252", "reference_id": "show_bug.cgi?id=1737252", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T15:10:40Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1737252" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-22744" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rsy6-acfe-ffb5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62676?format=api", "vulnerability_id": "VCID-rz6b-kepf-cfg9", "summary": "Mozilla developers and community members Christian Holler, Andrew McCreight, Dan Minor, Tyson Smith, Jon Coppeard, Jan-Ivar Bruaroey, Jesse Ruderman, and Markus Stange reported memory safety bugs present in Firefox 49. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5289.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5289.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5289", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01811", "scoring_system": "epss", "scoring_elements": "0.82765", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01811", "scoring_system": "epss", "scoring_elements": "0.82871", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01811", "scoring_system": "epss", "scoring_elements": "0.82822", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01811", "scoring_system": "epss", "scoring_elements": "0.82839", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01811", "scoring_system": "epss", "scoring_elements": "0.82834", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01811", "scoring_system": "epss", "scoring_elements": "0.8283", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01811", "scoring_system": "epss", "scoring_elements": "0.82869", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01811", "scoring_system": "epss", "scoring_elements": "0.82781", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01811", "scoring_system": "epss", "scoring_elements": "0.82795", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01811", "scoring_system": "epss", "scoring_elements": "0.82791", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01811", "scoring_system": "epss", "scoring_elements": "0.82816", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5289" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1296649%2C1298107%2C1300129%2C1305876%2C1314667%2C1301252%2C1277866%2C1307254%2C1252511%2C1264053", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1296649%2C1298107%2C1300129%2C1305876%2C1314667%2C1301252%2C1277866%2C1307254%2C1252511%2C1264053" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-89/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-89/" }, { "reference_url": "http://www.securityfocus.com/bid/94337", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94337" }, { "reference_url": "http://www.securitytracker.com/id/1037298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037298" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395098", "reference_id": "1395098", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395098" }, { "reference_url": "https://security.archlinux.org/ASA-201611-16", "reference_id": "ASA-201611-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-16" }, { "reference_url": "https://security.archlinux.org/AVG-72", "reference_id": "AVG-72", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-72" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5289", "reference_id": "CVE-2016-5289", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5289" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89", "reference_id": "mfsa2016-89", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89" }, { "reference_url": "https://usn.ubuntu.com/3124-1/", "reference_id": "USN-3124-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3124-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5289" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rz6b-kepf-cfg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33955?format=api", "vulnerability_id": "VCID-s3kc-mhdz-nkeh", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25743.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25743.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25743", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.2464", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24463", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24534", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.2448", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24494", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24488", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24677", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.2445", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24518", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24562", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24578", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25743" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170376", "reference_id": "2170376", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170376" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-05", "reference_id": "mfsa2023-05", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-05" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-05/", "reference_id": "mfsa2023-05", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:12:53Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-05/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-06/", "reference_id": "mfsa2023-06", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:12:53Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-06/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0805", "reference_id": "RHSA-2023:0805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0805" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0806", "reference_id": "RHSA-2023:0806", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0806" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0807", "reference_id": "RHSA-2023:0807", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0807" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0808", "reference_id": "RHSA-2023:0808", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0808" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0809", "reference_id": "RHSA-2023:0809", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0809" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0810", "reference_id": "RHSA-2023:0810", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0810" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0811", "reference_id": "RHSA-2023:0811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0811" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0812", "reference_id": "RHSA-2023:0812", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0812" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0817", "reference_id": "RHSA-2023:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0818", "reference_id": "RHSA-2023:0818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0819", "reference_id": "RHSA-2023:0819", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0819" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0820", "reference_id": "RHSA-2023:0820", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0820" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0821", "reference_id": "RHSA-2023:0821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0822", "reference_id": "RHSA-2023:0822", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0822" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0823", "reference_id": "RHSA-2023:0823", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0823" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0824", "reference_id": "RHSA-2023:0824", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0824" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1800203", "reference_id": "show_bug.cgi?id=1800203", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:12:53Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1800203" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-25743" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s3kc-mhdz-nkeh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60709?format=api", "vulnerability_id": "VCID-sjy7-cp3x-nfh2", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12368.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12368.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12368", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01952", "scoring_system": "epss", "scoring_elements": "0.83504", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01952", "scoring_system": "epss", "scoring_elements": "0.83461", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01952", "scoring_system": "epss", "scoring_elements": "0.83475", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01952", "scoring_system": "epss", "scoring_elements": "0.83469", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01952", "scoring_system": "epss", "scoring_elements": "0.83464", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01952", "scoring_system": "epss", "scoring_elements": "0.835", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01952", "scoring_system": "epss", "scoring_elements": "0.83502", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01952", "scoring_system": "epss", "scoring_elements": "0.834", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01952", "scoring_system": "epss", "scoring_elements": "0.83413", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01952", "scoring_system": "epss", "scoring_elements": "0.83428", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01952", "scoring_system": "epss", "scoring_elements": "0.83427", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01952", "scoring_system": "epss", "scoring_elements": "0.83451", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12368" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595033", "reference_id": "1595033", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595033" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-15", "reference_id": "mfsa2018-15", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-16", "reference_id": "mfsa2018-16", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-16" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-17", "reference_id": "mfsa2018-17", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-17" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-18", "reference_id": "mfsa2018-18", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-18" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-19", "reference_id": "mfsa2018-19", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-19" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-12368" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sjy7-cp3x-nfh2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51407?format=api", "vulnerability_id": "VCID-snbc-j4e3-uff1", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4582.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4582.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4582", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00718", "scoring_system": "epss", "scoring_elements": "0.72395", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74036", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.73995", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.73966", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74014", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74051", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74059", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.7405", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74011", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74018", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4582" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236081", "reference_id": "2236081", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236081" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-34/", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T20:00:26Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-36/", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T20:00:26Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-36/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-38/", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T20:00:26Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-38/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1773874", "reference_id": "show_bug.cgi?id=1773874", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T20:00:26Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1773874" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-4582" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-snbc-j4e3-uff1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56731?format=api", "vulnerability_id": "VCID-sncs-nk53-jbap", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5279.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5279.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5279", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00375", "scoring_system": "epss", "scoring_elements": "0.59019", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00375", "scoring_system": "epss", "scoring_elements": "0.59139", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00375", "scoring_system": "epss", "scoring_elements": "0.59137", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00375", "scoring_system": "epss", "scoring_elements": "0.59159", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00375", "scoring_system": "epss", "scoring_elements": "0.59094", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00375", "scoring_system": "epss", "scoring_elements": "0.59118", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00375", "scoring_system": "epss", "scoring_elements": "0.59082", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00375", "scoring_system": "epss", "scoring_elements": "0.59133", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00375", "scoring_system": "epss", "scoring_elements": "0.59136", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00375", "scoring_system": "epss", "scoring_elements": "0.59154", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5279" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377673", "reference_id": "1377673", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377673" }, { "reference_url": "https://security.archlinux.org/ASA-201609-22", "reference_id": "ASA-201609-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201609-22" }, { "reference_url": "https://security.archlinux.org/AVG-24", "reference_id": "AVG-24", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-24" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-85", "reference_id": "mfsa2016-85", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-85" }, { "reference_url": "https://usn.ubuntu.com/3076-1/", "reference_id": "USN-3076-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3076-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5279" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sncs-nk53-jbap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56671?format=api", "vulnerability_id": "VCID-sp11-eqxh-t3gw", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2817.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2817.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2817", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60702", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60539", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60689", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60669", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60711", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60717", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60614", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60643", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60663", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60679", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60703", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2817" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1227462", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1227462" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-46.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-46.html" }, { "reference_url": "http://www.securitytracker.com/id/1035692", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035692" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2936-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2936-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2936-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2936-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2936-3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2936-3" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330285", "reference_id": "1330285", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330285" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2817", "reference_id": "CVE-2016-2817", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2817" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2817", "reference_id": "CVE-2016-2817", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2817" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-46", "reference_id": "mfsa2016-46", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-46" }, { "reference_url": "https://usn.ubuntu.com/2936-1/", "reference_id": "USN-2936-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2936-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2817" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sp11-eqxh-t3gw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62885?format=api", "vulnerability_id": "VCID-srf6-8n4s-uyb6", "summary": "The Mozilla Maintenance Service can be invoked by an unprivileged user to overwrite arbitrary files with junk data using the Mozilla Windows Updater, which runs with the Maintenance Service's privileged access. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7767", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33537", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33583", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.3356", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33593", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33569", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33528", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.3368", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33551", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33595", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33629", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33624", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7767" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1336964", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1336964" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-15/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-15/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-16/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-16/" }, { "reference_url": "http://www.securityfocus.com/bid/99057", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/99057" }, { "reference_url": "http://www.securitytracker.com/id/1038689", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1038689" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7767", "reference_id": "CVE-2017-7767", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7767" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-15", "reference_id": "mfsa2017-15", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-16", "reference_id": "mfsa2017-16", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-7767" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-srf6-8n4s-uyb6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63198?format=api", "vulnerability_id": "VCID-t769-2t1u-57b6", "summary": "Microsoft introduced a new feature in Windows 10 known as Cloud Clipboard which, if enabled, will record data copied to the clipboard to the cloud, and make it available on other computers in certain scenarios. Applications that wish to prevent copied data from being recorded in Cloud History must use specific clipboard formats; and Firefox before versions 94 and ESR 91.3 did not implement them. This could have caused sensitive data to be recorded to a user's Microsoft account.*This bug only affects Firefox for Windows 10+ with Cloud Clipboard enabled. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38505.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38505.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-38505", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57727", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57782", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.5776", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57757", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57778", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.578", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57784", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57786", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63387", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.633", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.6336", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-38505" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019623", "reference_id": "2019623", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019623" }, { "reference_url": "https://security.archlinux.org/AVG-2512", "reference_id": "AVG-2512", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2512" }, { "reference_url": "https://security.archlinux.org/AVG-2519", "reference_id": "AVG-2519", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2519" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-48", "reference_id": "mfsa2021-48", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-48" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-49", "reference_id": "mfsa2021-49", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-49" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-50", "reference_id": "mfsa2021-50", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-50" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-38505" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t769-2t1u-57b6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62621?format=api", "vulnerability_id": "VCID-t8mb-cdc3-6ydq", "summary": "Due to large allocation checks in Angle for GLSL shaders being too lenient an out-of-bounds access could occur when allocating more than 8192 ints in private shader memory on mac OS.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6600.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6600.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6600", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.3573", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35779", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35791", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38249", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38199", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.3819", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.3814", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38272", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38158", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38182", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38217", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6600" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296635", "reference_id": "2296635", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296635" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29", "reference_id": "mfsa2024-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", "reference_id": "mfsa2024-29", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-22T16:08:57Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-30", "reference_id": "mfsa2024-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-30/", "reference_id": "mfsa2024-30", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-22T16:08:57Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-31", "reference_id": "mfsa2024-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-31/", "reference_id": "mfsa2024-31", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-22T16:08:57Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32", "reference_id": "mfsa2024-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", "reference_id": "mfsa2024-32", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-22T16:08:57Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1888340", "reference_id": "show_bug.cgi?id=1888340", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-22T16:08:57Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1888340" }, { "reference_url": "https://usn.ubuntu.com/6903-1/", "reference_id": "USN-6903-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6903-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-6600" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t8mb-cdc3-6ydq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51395?format=api", "vulnerability_id": "VCID-tfny-yt17-mffx", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4054.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4054.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4054", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09281", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09254", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09242", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09164", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09243", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09284", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09195", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0927", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09114", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09133", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0924", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4054" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228366", "reference_id": "2228366", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228366" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-30/", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32", "reference_id": "mfsa2023-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-32/", "reference_id": "mfsa2023-32", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-32/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-33/", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-33/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1840777", "reference_id": "show_bug.cgi?id=1840777", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1840777" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-4054" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tfny-yt17-mffx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62629?format=api", "vulnerability_id": "VCID-tjp3-ck7p-5qg3", "summary": "An attacker could have leveraged the Windows Error Reporter to run arbitrary code on the system escaping the sandbox. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2605.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2605.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2605", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55105", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55125", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.5506", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.5511", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55061", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55085", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55084", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55102", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55122", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2605" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270659", "reference_id": "2270659", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270659" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-12", "reference_id": "mfsa2024-12", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-12" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-12/", "reference_id": "mfsa2024-12", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:48:39Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-12/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-13", "reference_id": "mfsa2024-13", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-13" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-13/", "reference_id": "mfsa2024-13", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:48:39Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-13/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-14", "reference_id": "mfsa2024-14", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-14" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-14/", "reference_id": "mfsa2024-14", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:48:39Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-14/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1872920", "reference_id": "show_bug.cgi?id=1872920", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:48:39Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1872920" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-2605" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tjp3-ck7p-5qg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63432?format=api", "vulnerability_id": "VCID-tnxh-tgsm-tuex", "summary": "A race condition could have allowed bypassing the fullscreen notification which could have lead to a fullscreen window spoof being unnoticed.*This bug only affects Firefox for Windows. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22746.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22746.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-22746", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30958", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30992", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31111", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31009", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30979", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31024", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31068", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31062", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31033", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31158", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30976", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-22746" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039560", "reference_id": "2039560", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039560" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-01", "reference_id": "mfsa2022-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-01/", "reference_id": "mfsa2022-01", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:59:19Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-02", "reference_id": "mfsa2022-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-02/", "reference_id": "mfsa2022-02", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:59:19Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-03", "reference_id": "mfsa2022-03", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-03" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-03/", "reference_id": "mfsa2022-03", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:59:19Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-03/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1735071", "reference_id": "show_bug.cgi?id=1735071", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:59:19Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1735071" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-22746" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tnxh-tgsm-tuex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51408?format=api", "vulnerability_id": "VCID-tq43-rx5u-eybv", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4583.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4583.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4583", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34978", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35011", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35053", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34933", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35007", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35026", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34931", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34974", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3499", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34951", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34975", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4583" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236082", "reference_id": "2236082", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236082" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-34/", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-19T19:09:13Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-36/", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-19T19:09:13Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-36/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-38/", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-19T19:09:13Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4945", "reference_id": "RHSA-2023:4945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4946", "reference_id": "RHSA-2023:4946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4947", "reference_id": "RHSA-2023:4947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4948", "reference_id": "RHSA-2023:4948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4949", "reference_id": "RHSA-2023:4949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4950", "reference_id": "RHSA-2023:4950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4951", "reference_id": "RHSA-2023:4951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4952", "reference_id": "RHSA-2023:4952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4954", "reference_id": "RHSA-2023:4954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4955", "reference_id": "RHSA-2023:4955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4956", "reference_id": "RHSA-2023:4956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4957", "reference_id": "RHSA-2023:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4958", "reference_id": "RHSA-2023:4958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4959", "reference_id": "RHSA-2023:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5019", "reference_id": "RHSA-2023:5019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5019" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1842030", "reference_id": "show_bug.cgi?id=1842030", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-19T19:09:13Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1842030" }, { "reference_url": "https://usn.ubuntu.com/6320-1/", "reference_id": "USN-6320-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6320-1/" }, { "reference_url": "https://usn.ubuntu.com/6405-1/", "reference_id": "USN-6405-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6405-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922200?format=api", "purl": "pkg:deb/debian/firefox-esr@115.2.0esr-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.2.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-4583" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tq43-rx5u-eybv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62905?format=api", "vulnerability_id": "VCID-u1nc-fgsw-mkhc", "summary": "Mozilla developers and community members Gary Kwong, Olli Pettay, Tooru Fujisawa, Carsten Book, Andrew McCreight, Chris Pearce, Ronald Crane, Jan de Mooij, Julian Seward, Nicolas Pierron, Randell Jesup, Esther Monchari, Honza Bambas, and Philipp reported memory safety bugs present in Firefox 50.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5374", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.83024", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82917", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82991", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82985", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82981", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.8302", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82934", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82946", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82943", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82968", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82975", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5374" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1325344%2C1317501%2C1311319%2C1329989%2C1300145%2C1322305%2C1288561%2C1295747%2C1318766%2C1297808%2C1321374%2C1324810%2C1313385%2C1319888%2C1302231%2C1307458%2C1293327%2C1315447%2C1319456", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1325344%2C1317501%2C1311319%2C1329989%2C1300145%2C1322305%2C1288561%2C1295747%2C1318766%2C1297808%2C1321374%2C1324810%2C1313385%2C1319888%2C1302231%2C1307458%2C1293327%2C1315447%2C1319456" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-01/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-01/" }, { "reference_url": "http://www.securityfocus.com/bid/95759", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/95759" }, { "reference_url": "http://www.securitytracker.com/id/1037693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037693" }, { "reference_url": "https://security.archlinux.org/ASA-201701-39", "reference_id": "ASA-201701-39", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-39" }, { "reference_url": "https://security.archlinux.org/AVG-157", "reference_id": "AVG-157", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-157" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5374", "reference_id": "CVE-2017-5374", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5374" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01", "reference_id": "mfsa2017-01", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01" }, { "reference_url": "https://usn.ubuntu.com/3175-1/", "reference_id": "USN-3175-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3175-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-5374" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u1nc-fgsw-mkhc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33945?format=api", "vulnerability_id": "VCID-u5n5-6h82-tqhw", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25734.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25734.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25734", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39428", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39513", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39526", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39541", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39491", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39508", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39546", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39535", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39519", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39465", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39549", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25734" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170384", "reference_id": "2170384", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170384" }, { "reference_url": "https://security.gentoo.org/glsa/202305-35", "reference_id": "GLSA-202305-35", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202305-35" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-05", "reference_id": "mfsa2023-05", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-05" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-05/", "reference_id": "mfsa2023-05", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-01-09T20:59:56Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-05/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-06", "reference_id": "mfsa2023-06", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-06" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-06/", "reference_id": "mfsa2023-06", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-01-09T20:59:56Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-06/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-07", "reference_id": "mfsa2023-07", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-07" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-07/", "reference_id": "mfsa2023-07", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-01-09T20:59:56Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-07/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1784451", "reference_id": "show_bug.cgi?id=1784451", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-01-09T20:59:56Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1784451" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1809923", "reference_id": "show_bug.cgi?id=1809923", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-01-09T20:59:56Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1809923" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1810143", "reference_id": "show_bug.cgi?id=1810143", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-01-09T20:59:56Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1810143" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1812338", "reference_id": "show_bug.cgi?id=1812338", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-01-09T20:59:56Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1812338" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-25734" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u5n5-6h82-tqhw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56726?format=api", "vulnerability_id": "VCID-uhct-zkhb-k3ca", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5275.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5275.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5275", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01682", "scoring_system": "epss", "scoring_elements": "0.82114", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01682", "scoring_system": "epss", "scoring_elements": "0.82222", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01682", "scoring_system": "epss", "scoring_elements": "0.82185", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01682", "scoring_system": "epss", "scoring_elements": "0.82221", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01682", "scoring_system": "epss", "scoring_elements": "0.82128", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01682", "scoring_system": "epss", "scoring_elements": "0.82149", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01682", "scoring_system": "epss", "scoring_elements": "0.82146", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01682", "scoring_system": "epss", "scoring_elements": "0.82172", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01682", "scoring_system": "epss", "scoring_elements": "0.8218", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01682", "scoring_system": "epss", "scoring_elements": "0.82198", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01682", "scoring_system": "epss", "scoring_elements": "0.8219", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5275" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377667", "reference_id": "1377667", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377667" }, { "reference_url": "https://security.archlinux.org/ASA-201609-22", "reference_id": "ASA-201609-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201609-22" }, { "reference_url": "https://security.archlinux.org/AVG-24", "reference_id": "AVG-24", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-24" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-85", "reference_id": "mfsa2016-85", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-85" }, { "reference_url": "https://usn.ubuntu.com/3076-1/", "reference_id": "USN-3076-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3076-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5275" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uhct-zkhb-k3ca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56743?format=api", "vulnerability_id": "VCID-umhx-zswu-kkbt", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5293", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21786", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.2187", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21813", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21816", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21822", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21782", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21947", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.22001", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21766", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21843", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21899", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21911", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5293" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1246945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1246945" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-89/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-89/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-90/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-90/" }, { "reference_url": "http://www.securityfocus.com/bid/94336", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94336" }, { "reference_url": "http://www.securitytracker.com/id/1037298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037298" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5293", "reference_id": "CVE-2016-5293", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5293" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89", "reference_id": "mfsa2016-89", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-90", "reference_id": "mfsa2016-90", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-90" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5293" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-umhx-zswu-kkbt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63154?format=api", "vulnerability_id": "VCID-urpr-qse2-7kcf", "summary": "Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak.*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26966.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26966.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26966", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63407", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63439", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63386", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63421", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63428", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.633", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.6336", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63387", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63352", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63404", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63422", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26966" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898740", "reference_id": "1898740", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898740" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-50", "reference_id": "mfsa2020-50", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-50" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-51", "reference_id": "mfsa2020-51", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-51" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-52", "reference_id": "mfsa2020-52", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-52" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-26966" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-urpr-qse2-7kcf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63324?format=api", "vulnerability_id": "VCID-uuc6-a3xx-6khk", "summary": "Firefox will accept any registered Program ID as an external protocol handler and offer to launch this local application when given a matching URL on Windows operating systems. This should only happen if the program has specifically registered itself as a \"URL Handler\" in the Windows registry. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9801.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9801.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9801", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58775", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58759", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58792", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58797", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58647", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58731", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58752", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.5872", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58772", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58779", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58798", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9801" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690682", "reference_id": "1690682", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690682" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-07", "reference_id": "mfsa2019-07", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-07" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-08", "reference_id": "mfsa2019-08", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-11", "reference_id": "mfsa2019-11", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-11" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-9801" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uuc6-a3xx-6khk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62672?format=api", "vulnerability_id": "VCID-v28j-cvrw-p3c7", "summary": "WebExtensions can bypass security checks to load privileged URLs and potentially escape the WebExtension sandbox.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9073.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9073.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9073", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.7412", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74206", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74192", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74174", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74167", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74205", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74214", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74125", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74151", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74123", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74156", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.7417", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9073" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1289273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1289273" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-89/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-89/" }, { "reference_url": "http://www.securityfocus.com/bid/94337", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94337" }, { "reference_url": "http://www.securitytracker.com/id/1037298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037298" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396545", "reference_id": "1396545", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396545" }, { "reference_url": "https://security.archlinux.org/ASA-201611-16", "reference_id": "ASA-201611-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-16" }, { "reference_url": "https://security.archlinux.org/AVG-72", "reference_id": "AVG-72", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-72" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9073", "reference_id": "CVE-2016-9073", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9073" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89", "reference_id": "mfsa2016-89", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89" }, { "reference_url": "https://usn.ubuntu.com/3124-1/", "reference_id": "USN-3124-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3124-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9073" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v28j-cvrw-p3c7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50247?format=api", "vulnerability_id": "VCID-v9ua-1tey-cyaa", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46875.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46875.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46875", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34404", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34442", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34517", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34457", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34422", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34446", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34485", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34483", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34454", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34412", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34545", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46875" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153451", "reference_id": "2153451", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153451" }, { "reference_url": "https://security.gentoo.org/glsa/202305-06", "reference_id": "GLSA-202305-06", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:56:00Z/" } ], "url": "https://security.gentoo.org/glsa/202305-06" }, { "reference_url": "https://security.gentoo.org/glsa/202305-13", "reference_id": "GLSA-202305-13", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:56:00Z/" } ], "url": "https://security.gentoo.org/glsa/202305-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-51", "reference_id": "mfsa2022-51", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-51" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-51/", "reference_id": "mfsa2022-51", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:56:00Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-51/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-52", "reference_id": "mfsa2022-52", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-52" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-52/", "reference_id": "mfsa2022-52", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:56:00Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-52/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-53", "reference_id": "mfsa2022-53", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-53" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-53/", "reference_id": "mfsa2022-53", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:56:00Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-53/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1786188", "reference_id": "show_bug.cgi?id=1786188", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:56:00Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1786188" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-46875" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v9ua-1tey-cyaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56722?format=api", "vulnerability_id": "VCID-vdvy-zc8w-6kbf", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5271.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5271.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5271", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.6241", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62548", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.6256", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62566", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62468", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.625", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62467", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62518", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62534", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62553", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62542", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62519", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5271" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377661", "reference_id": "1377661", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377661" }, { "reference_url": "https://security.archlinux.org/ASA-201609-22", "reference_id": "ASA-201609-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201609-22" }, { "reference_url": "https://security.archlinux.org/AVG-24", "reference_id": "AVG-24", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-24" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-85", "reference_id": "mfsa2016-85", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-85" }, { "reference_url": "https://usn.ubuntu.com/3076-1/", "reference_id": "USN-3076-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3076-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5271" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vdvy-zc8w-6kbf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62893?format=api", "vulnerability_id": "VCID-vnuz-wp96-pqgt", "summary": "WebExtensions could use the mozAddonManager API by modifying the CSP headers on sites with the appropriate permissions and then using host requests to redirect script loads to a malicious site. This allows a malicious extension to then install additional extensions without explicit user permission.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5389", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59095", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.58975", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59112", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59075", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59111", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59116", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.5905", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59072", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59037", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59088", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59094", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5389" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1308688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1308688" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-01/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-01/" }, { "reference_url": "http://www.securityfocus.com/bid/95763", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/95763" }, { "reference_url": "http://www.securitytracker.com/id/1037693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037693" }, { "reference_url": "https://security.archlinux.org/ASA-201701-39", "reference_id": "ASA-201701-39", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-39" }, { "reference_url": "https://security.archlinux.org/AVG-157", "reference_id": "AVG-157", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-157" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5389", "reference_id": "CVE-2017-5389", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" }, { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5389" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01", "reference_id": "mfsa2017-01", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-01" }, { "reference_url": "https://usn.ubuntu.com/3175-1/", "reference_id": "USN-3175-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3175-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-5389" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vnuz-wp96-pqgt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38344?format=api", "vulnerability_id": "VCID-vtjf-sufh-p3h4", "summary": "crossbeam-deque Data Race before v0.7.4 and v0.8.1\n### Impact\n\nIn the affected version of this crate, the result of the race condition is that one or more tasks in the worker queue can be popped twice instead of other tasks that are forgotten and never popped. If tasks are allocated on the heap, this can cause double free and a memory leak. If not, this still can cause a logical bug.\n\nCrates using `Stealer::steal`, `Stealer::steal_batch`, or `Stealer::steal_batch_and_pop` are affected by this issue.\n\n### Patches\n\nThis has been fixed in crossbeam-deque 0.8.1 and 0.7.4.\n\n### Credits\n\nThis issue was reported and fixed by Maor Kleinberger.\n\n### License\n\nThis advisory is in the public domain.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32810.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32810.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32810", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01079", "scoring_system": "epss", "scoring_elements": "0.7777", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01079", "scoring_system": "epss", "scoring_elements": "0.77847", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01079", "scoring_system": "epss", "scoring_elements": "0.7782", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01079", "scoring_system": "epss", "scoring_elements": "0.77815", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01079", "scoring_system": "epss", "scoring_elements": "0.77787", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01079", "scoring_system": "epss", "scoring_elements": "0.77804", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01079", "scoring_system": "epss", "scoring_elements": "0.77777", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01094", "scoring_system": "epss", "scoring_elements": "0.7798", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01094", "scoring_system": "epss", "scoring_elements": "0.78006", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01094", "scoring_system": "epss", "scoring_elements": "0.78013", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01094", "scoring_system": "epss", "scoring_elements": "0.77979", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32810" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32810", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32810" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/crossbeam-rs/crossbeam", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/crossbeam-rs/crossbeam" }, { "reference_url": "https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE/" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32810", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32810" }, { "reference_url": "https://rustsec.org/advisories/RUSTSEC-2021-0093.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://rustsec.org/advisories/RUSTSEC-2021-0093.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990342", "reference_id": "1990342", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990342" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993146", "reference_id": "993146", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993146" }, { "reference_url": "https://security.archlinux.org/AVG-2443", "reference_id": "AVG-2443", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2443" }, { "reference_url": "https://security.archlinux.org/AVG-2459", "reference_id": "AVG-2459", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2459" }, { "reference_url": "https://github.com/advisories/GHSA-pqqp-xmhj-wgcw", "reference_id": "GHSA-pqqp-xmhj-wgcw", "reference_type": "", "scores": [ { "value": "CRITICAL", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-pqqp-xmhj-wgcw" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-43", "reference_id": "mfsa2021-43", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-43" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-45", "reference_id": "mfsa2021-45", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-45" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-47", "reference_id": "mfsa2021-47", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-47" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3755", "reference_id": "RHSA-2021:3755", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3755" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3756", "reference_id": "RHSA-2021:3756", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3756" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3757", "reference_id": "RHSA-2021:3757", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3757" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3791", "reference_id": "RHSA-2021:3791", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3791" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3838", "reference_id": "RHSA-2021:3838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3838" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3839", "reference_id": "RHSA-2021:3839", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3839" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3840", "reference_id": "RHSA-2021:3840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3841", "reference_id": "RHSA-2021:3841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3841" }, { "reference_url": "https://usn.ubuntu.com/5107-1/", "reference_id": "USN-5107-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5107-1/" }, { "reference_url": "https://usn.ubuntu.com/5132-1/", "reference_id": "USN-5132-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5132-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-32810", "GHSA-pqqp-xmhj-wgcw" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vtjf-sufh-p3h4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63132?format=api", "vulnerability_id": "VCID-vun4-z8ju-gbbc", "summary": "If Firefox is installed to a user-writable directory, the Mozilla Maintenance Service would execute updater.exe from the install location with administrative privileges. Although the Mozilla Maintenance Service does ensure that updater.exe is signed by Mozilla, the version could have been rolled back to a previous version which would have allowed exploitation of an older bug and arbitrary code execution with system privileges.*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15663.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15663.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15663", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82182", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.8213", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82137", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82156", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82147", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82141", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82179", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82074", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82086", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82107", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82103", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15663" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872530", "reference_id": "1872530", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872530" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-36", "reference_id": "mfsa2020-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-36" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-37", "reference_id": "mfsa2020-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-37" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-38", "reference_id": "mfsa2020-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-38" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-40", "reference_id": "mfsa2020-40", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-40" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-41", "reference_id": "mfsa2020-41", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-41" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-15663" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vun4-z8ju-gbbc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51420?format=api", "vulnerability_id": "VCID-vw4n-4r41-ukbp", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5727.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5727.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5727", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43728", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43795", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43771", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43716", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43767", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43758", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43804", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43742", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43791", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43783", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5727" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245902", "reference_id": "2245902", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245902" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-45/", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:47:05Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-45/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-46", "reference_id": "mfsa2023-46", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-46" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-46/", "reference_id": "mfsa2023-46", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:47:05Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-46/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-47", "reference_id": "mfsa2023-47", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-47" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-47/", "reference_id": "mfsa2023-47", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:47:05Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-47/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1847180", "reference_id": "show_bug.cgi?id=1847180", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:47:05Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1847180" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-5727" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vw4n-4r41-ukbp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31210?format=api", "vulnerability_id": "VCID-vzg5-b77s-g3ft", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34478.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34478.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34478", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.3532", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35373", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35422", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35384", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35345", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35367", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35403", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35401", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35377", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35446", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.3533", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34478" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102167", "reference_id": "2102167", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102167" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-24/", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:14:23Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-24/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-25", "reference_id": "mfsa2022-25", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-25" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-25/", "reference_id": "mfsa2022-25", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:14:23Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-25/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-26", "reference_id": "mfsa2022-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-26" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-26/", "reference_id": "mfsa2022-26", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:14:23Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-26/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1773717", "reference_id": "show_bug.cgi?id=1773717", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:14:23Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1773717" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-34478" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vzg5-b77s-g3ft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56651?format=api", "vulnerability_id": "VCID-vzkp-7dsz-kbee", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2810.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2810.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2810", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50649", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.5053", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50637", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50623", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50664", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.5067", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50586", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50614", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50567", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.5062", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50617", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.5066", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2810" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1229681", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1229681" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-41.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-41.html" }, { "reference_url": "http://www.securitytracker.com/id/1035692", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035692" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330274", "reference_id": "1330274", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330274" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2810", "reference_id": "CVE-2016-2810", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2810" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2810", "reference_id": "CVE-2016-2810", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2810" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-41", "reference_id": "mfsa2016-41", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-41" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2810" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vzkp-7dsz-kbee" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63500?format=api", "vulnerability_id": "VCID-vzwe-r2ms-m7bv", "summary": "Mozilla engineer Matt Wobensmith reported that Content Security Policy\n(CSP) does not block the loading of cross-domain Java applets when specified by policy.\nThis is because the Java applet is loaded by the Java plugin, which then mediates all\nnetwork requests without checking against CSP. This could allow a malicious site to\nmanipulate content through a Java applet to bypass CSP protections, allowing for possible\ncross-site scripting (XSS) attacks.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2833.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2833.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2833", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49457", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49363", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.4944", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49411", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49413", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.4946", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49392", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49419", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49372", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49427", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49422", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2833" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=908933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=908933" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-60.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-60.html" }, { "reference_url": "http://www.securitytracker.com/id/1036057", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036057" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2993-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2993-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1342900", "reference_id": "1342900", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1342900" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2833", "reference_id": "CVE-2016-2833", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2833" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2833", "reference_id": "CVE-2016-2833", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2833" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-60", "reference_id": "mfsa2016-60", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-60" }, { "reference_url": "https://usn.ubuntu.com/2993-1/", "reference_id": "USN-2993-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2993-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2833" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vzwe-r2ms-m7bv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62657?format=api", "vulnerability_id": "VCID-wffz-7y83-qkbm", "summary": "Mozilla developers and community members Kan-Ru Chen, Christian Holler, and Tyson Smith reported memory safety bugs present in Firefox 50.0.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9080", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.83024", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82917", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82975", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82991", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82985", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82981", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.8302", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82934", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82946", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82943", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01847", "scoring_system": "epss", "scoring_elements": "0.82968", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9080" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1289701%2C1314401%2C1315848", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1289701%2C1314401%2C1315848" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-94/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-94/" }, { "reference_url": "http://www.securityfocus.com/bid/94883", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94883" }, { "reference_url": "http://www.securitytracker.com/id/1037461", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037461" }, { "reference_url": "https://security.archlinux.org/ASA-201612-15", "reference_id": "ASA-201612-15", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201612-15" }, { "reference_url": "https://security.archlinux.org/AVG-106", "reference_id": "AVG-106", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-106" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9080", "reference_id": "CVE-2016-9080", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9080" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-94", "reference_id": "mfsa2016-94", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-94" }, { "reference_url": "https://usn.ubuntu.com/3155-1/", "reference_id": "USN-3155-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3155-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9080" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wffz-7y83-qkbm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63360?format=api", "vulnerability_id": "VCID-wfkr-weku-fudt", "summary": "Logging-related command line parameters are not properly sanitized when Firefox is launched by another program, such as when a user clicks on malicious links in a chat application. This can be used to write a log file to an arbitrary location such as the Windows 'Startup' folder. *Note: this issue only affects Firefox on Windows operating systems.*", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11751.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11751.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11751", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.6602", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66027", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66014", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66019", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66033", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65908", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65949", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65979", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65945", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65996", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66008", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11751" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1572838", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1572838" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2019-25/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2019-25/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2019-26/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2019-26/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1748668", "reference_id": "1748668", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1748668" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11751", "reference_id": "CVE-2019-11751", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11751" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-25", "reference_id": "mfsa2019-25", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-26", "reference_id": "mfsa2019-26", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-11751" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wfkr-weku-fudt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63065?format=api", "vulnerability_id": "VCID-wfqy-u76t-ybgb", "summary": "Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox\ndevelopers identified a similar pattern in our IPC code. A compromised child\nprocess could cause the parent process to return an unintentionally\npowerful handle, leading to a sandbox escape.\nThe original vulnerability was being exploited in the wild.\n*This only affects Firefox on Windows. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-2857.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-2857.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-2857", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31506", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31657", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31701", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31519", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31571", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31601", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31606", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31564", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31527", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31561", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31538", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-2857" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355327", "reference_id": "2355327", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355327" }, { "reference_url": "https://www.cve.org/CVERecord?id=CVE-2025-2783", "reference_id": "CVERecord?id=CVE-2025-2783", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-28T15:23:40Z/" } ], "url": "https://www.cve.org/CVERecord?id=CVE-2025-2783" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-19", "reference_id": "mfsa2025-19", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-19" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-19/", "reference_id": "mfsa2025-19", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-28T15:23:40Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-19/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1956398", "reference_id": "show_bug.cgi?id=1956398", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-28T15:23:40Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1956398" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-2857" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wfqy-u76t-ybgb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63399?format=api", "vulnerability_id": "VCID-wzxk-316c-xqcg", "summary": "When downloading files on Windows, the % character was not escaped, which could have lead to a download incorrectly being saved to attacker-influenced paths that used variables such as %HOMEPATH% or %APPDATA%.*This bug only affects Firefox for Windows. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31739.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31739.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31739", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00477", "scoring_system": "epss", "scoring_elements": "0.64976", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00477", "scoring_system": "epss", "scoring_elements": "0.64992", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00477", "scoring_system": "epss", "scoring_elements": "0.64981", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00477", "scoring_system": "epss", "scoring_elements": "0.6491", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00477", "scoring_system": "epss", "scoring_elements": "0.64944", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00477", "scoring_system": "epss", "scoring_elements": "0.64972", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00477", "scoring_system": "epss", "scoring_elements": "0.64982", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00477", "scoring_system": "epss", "scoring_elements": "0.64964", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00477", "scoring_system": "epss", "scoring_elements": "0.6495", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00477", "scoring_system": "epss", "scoring_elements": "0.64937", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00477", "scoring_system": "epss", "scoring_elements": "0.649", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31739" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092022", "reference_id": "2092022", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092022" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-20/", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:52:42Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-20/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-21", "reference_id": "mfsa2022-21", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-21" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-21/", "reference_id": "mfsa2022-21", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:52:42Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-21/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-22", "reference_id": "mfsa2022-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-22" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-22/", "reference_id": "mfsa2022-22", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:52:42Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-22/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1765049", "reference_id": "show_bug.cgi?id=1765049", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:52:42Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1765049" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-31739" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wzxk-316c-xqcg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51392?format=api", "vulnerability_id": "VCID-xrg1-azru-5qf1", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4051.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4051.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4051", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34193", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34205", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34269", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34172", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34196", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34236", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34207", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34165", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34301", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.3646", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4051" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236076", "reference_id": "2236076", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236076" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:40:45Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-36/", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:40:45Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-36/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-38/", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:40:45Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4945", "reference_id": "RHSA-2023:4945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4946", "reference_id": "RHSA-2023:4946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4947", "reference_id": "RHSA-2023:4947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4948", "reference_id": "RHSA-2023:4948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4949", "reference_id": "RHSA-2023:4949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4950", "reference_id": "RHSA-2023:4950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4951", "reference_id": "RHSA-2023:4951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4952", "reference_id": "RHSA-2023:4952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4954", "reference_id": "RHSA-2023:4954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4955", "reference_id": "RHSA-2023:4955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4956", "reference_id": "RHSA-2023:4956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4957", "reference_id": "RHSA-2023:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4958", "reference_id": "RHSA-2023:4958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4959", "reference_id": "RHSA-2023:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5019", "reference_id": "RHSA-2023:5019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5019" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1821884", "reference_id": "show_bug.cgi?id=1821884", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:40:45Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1821884" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922200?format=api", "purl": "pkg:deb/debian/firefox-esr@115.2.0esr-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.2.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-4051" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xrg1-azru-5qf1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63762?format=api", "vulnerability_id": "VCID-xspq-dfwk-27gq", "summary": "Mozilla developer Johann Hofmann reported that unsanitized output in the browser UI can lead to arbitrary code execution.\nThis issue did not affect Firefox for Android or Firefox 52 ESR.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5124.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5124.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5124", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68115", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68138", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68155", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68133", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68184", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68199", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68224", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68211", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68177", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68215", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68206", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5124" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540431", "reference_id": "1540431", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540431" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5124", "reference_id": "CVE-2018-5124", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5124" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-05", "reference_id": "mfsa2018-05", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-05" }, { "reference_url": "https://usn.ubuntu.com/3552-1/", "reference_id": "USN-3552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-5124" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xspq-dfwk-27gq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62881?format=api", "vulnerability_id": "VCID-y7rn-wb1d-vbdg", "summary": "The \"Mark of the Web\" was not correctly saved on Windows when files with very long names were downloaded from the Internet. Without the Mark of the Web data, the security warning that Windows displays before running executables downloaded from the Internet is not shown. *Note: This attack only affects Windows operating systems. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7765", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65711", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65723", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65709", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65679", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65714", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65727", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65595", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65644", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65673", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65638", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.6569", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65702", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7765" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1273265", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1273265" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-15/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-15/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-16/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-16/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2017-17/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2017-17/" }, { "reference_url": "http://www.securityfocus.com/bid/99057", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/99057" }, { "reference_url": "http://www.securitytracker.com/id/1038689", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1038689" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7765", "reference_id": "CVE-2017-7765", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7765" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-15", "reference_id": "mfsa2017-15", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-16", "reference_id": "mfsa2017-16", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-16" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-17", "reference_id": "mfsa2017-17", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-17" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-7765" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y7rn-wb1d-vbdg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63200?format=api", "vulnerability_id": "VCID-yfmg-82tr-gfec", "summary": "The executable file warning was not presented when downloading .inetloc files, which, due to a flaw in Mac OS, can run commands on a user's computer.*Note: This issue only affected Mac OS operating systems. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38510.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38510.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-38510", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64398", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64446", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64472", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64467", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64433", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64474", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64462", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64479", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64564", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64482", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64535", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-38510" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019629", "reference_id": "2019629", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019629" }, { "reference_url": "https://security.archlinux.org/AVG-2512", "reference_id": "AVG-2512", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2512" }, { "reference_url": "https://security.archlinux.org/AVG-2519", "reference_id": "AVG-2519", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2519" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-48", "reference_id": "mfsa2021-48", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-48" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-49", "reference_id": "mfsa2021-49", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-49" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-50", "reference_id": "mfsa2021-50", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-50" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-38510" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yfmg-82tr-gfec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51394?format=api", "vulnerability_id": "VCID-ygrd-4scr-wkau", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4053.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4053.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4053", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34805", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34855", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34884", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34887", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.3485", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34826", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34865", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34849", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34904", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34931", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.3481", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4053" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236078", "reference_id": "2236078", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236078" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:53Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-36/", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:53Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-36/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-38/", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:53Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4945", "reference_id": "RHSA-2023:4945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4946", "reference_id": "RHSA-2023:4946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4947", "reference_id": "RHSA-2023:4947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4948", "reference_id": "RHSA-2023:4948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4949", "reference_id": "RHSA-2023:4949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4950", "reference_id": "RHSA-2023:4950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4951", "reference_id": "RHSA-2023:4951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4952", "reference_id": "RHSA-2023:4952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4954", "reference_id": "RHSA-2023:4954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4955", "reference_id": "RHSA-2023:4955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4956", "reference_id": "RHSA-2023:4956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4957", "reference_id": "RHSA-2023:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4958", "reference_id": "RHSA-2023:4958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4959", "reference_id": "RHSA-2023:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5019", "reference_id": "RHSA-2023:5019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5019" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1839079", "reference_id": "show_bug.cgi?id=1839079", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:53Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1839079" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922200?format=api", "purl": "pkg:deb/debian/firefox-esr@115.2.0esr-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.2.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-4053" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ygrd-4scr-wkau" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62623?format=api", "vulnerability_id": "VCID-yust-3g8v-muas", "summary": "The executable file warning was not presented when downloading .xrm-ms files. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3863.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3863.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-3863", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56663", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56691", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56642", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56643", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56664", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56693", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56662", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56683", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56708", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56699", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56695", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-3863" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275554", "reference_id": "2275554", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275554" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-18", "reference_id": "mfsa2024-18", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-18" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-18/", "reference_id": "mfsa2024-18", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T15:24:10Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-18/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-19", "reference_id": "mfsa2024-19", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-19" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-19/", "reference_id": "mfsa2024-19", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T15:24:10Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-19/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-20", "reference_id": "mfsa2024-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-20" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-20/", "reference_id": "mfsa2024-20", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T15:24:10Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-20/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1885855", "reference_id": "show_bug.cgi?id=1885855", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T15:24:10Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1885855" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-3863" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yust-3g8v-muas" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62673?format=api", "vulnerability_id": "VCID-yy4z-p3f1-qbbc", "summary": "An issue where a <select> dropdown menu can be used to cover location bar content, resulting in potential spoofing attacks. This attack requires e10s to be enabled in order to function.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9076.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9076.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9076", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67067", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67167", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67183", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67169", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67139", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67172", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67186", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67104", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67127", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67102", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67152", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67164", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9076" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1276976", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1276976" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2016-89/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2016-89/" }, { "reference_url": "http://www.securityfocus.com/bid/94337", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94337" }, { "reference_url": "http://www.securitytracker.com/id/1037298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037298" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396537", "reference_id": "1396537", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396537" }, { "reference_url": "https://security.archlinux.org/ASA-201611-16", "reference_id": "ASA-201611-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-16" }, { "reference_url": "https://security.archlinux.org/AVG-72", "reference_id": "AVG-72", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-72" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9076", "reference_id": "CVE-2016-9076", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9076" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89", "reference_id": "mfsa2016-89", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-89" }, { "reference_url": "https://usn.ubuntu.com/3124-1/", "reference_id": "USN-3124-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3124-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9076" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yy4z-p3f1-qbbc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56717?format=api", "vulnerability_id": "VCID-z86r-71n4-p7aj", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Thunderbird the worst of which could lead to the execution of arbitrary\n code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5267", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58791", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58663", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58813", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58775", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58808", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58747", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58768", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58735", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58788", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58795", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5267" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1284372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1284372" }, { "reference_url": "http://www.mozilla.org/security/announce/2016/mfsa2016-82.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-82.html" }, { "reference_url": "http://www.securityfocus.com/bid/92260", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92260" }, { "reference_url": "http://www.securitytracker.com/id/1036508", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036508" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5267", "reference_id": "CVE-2016-5267", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5267" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5267", "reference_id": "CVE-2016-5267", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5267" }, { "reference_url": "https://security.gentoo.org/glsa/201701-15", "reference_id": "GLSA-201701-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-82", "reference_id": "mfsa2016-82", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-82" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5267" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z86r-71n4-p7aj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63046?format=api", "vulnerability_id": "VCID-zdbt-zhtq-xfhj", "summary": "Insufficient escaping in the “Copy as cURL” feature could have been used to trick a user into executing unexpected code on Windows. This did not affect Firefox running on other operating systems.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11713.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11713.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11713", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11255", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11124", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11122", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11313", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11259", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11178", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11258", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11374", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11286", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11319", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11713" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403767", "reference_id": "2403767", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403767" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-81", "reference_id": "mfsa2025-81", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-81" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-81/", "reference_id": "mfsa2025-81", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-21T03:55:18Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-81/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-83", "reference_id": "mfsa2025-83", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-83" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-83/", "reference_id": "mfsa2025-83", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-21T03:55:18Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-83/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-84", "reference_id": "mfsa2025-84", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-84" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-84/", "reference_id": "mfsa2025-84", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-21T03:55:18Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-84/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-85", "reference_id": "mfsa2025-85", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-85" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-85/", "reference_id": "mfsa2025-85", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-21T03:55:18Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-85/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1986142", "reference_id": "show_bug.cgi?id=1986142", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-21T03:55:18Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1986142" }, { "reference_url": "https://usn.ubuntu.com/7991-1/", "reference_id": "USN-7991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-11713" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zdbt-zhtq-xfhj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51419?format=api", "vulnerability_id": "VCID-zjn8-79ab-tqd3", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5726.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5726.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5726", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38657", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38703", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38753", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38764", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38776", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38739", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38712", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38758", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38736", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38752", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38774", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5726" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245901", "reference_id": "2245901", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245901" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-45/", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:53:41Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-45/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-46", "reference_id": "mfsa2023-46", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-46" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-46/", "reference_id": "mfsa2023-46", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:53:41Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-46/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-47", "reference_id": "mfsa2023-47", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-47" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-47/", "reference_id": "mfsa2023-47", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:53:41Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-47/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846205", "reference_id": "show_bug.cgi?id=1846205", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:53:41Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846205" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-5726" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zjn8-79ab-tqd3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63340?format=api", "vulnerability_id": "VCID-zycf-ufab-8yfb", "summary": "The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. If the Mozilla Maintenance Service is manipulated to update this unprotected location and the updated maintenance service in the unprotected location has been altered, the altered maintenance service can run with elevated privileges during the update process due to a lack of integrity checks. This allows for privilege escalation if the executable has been replaced locally. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11753.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11753.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11753", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19349", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19469", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19473", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19425", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19368", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19329", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19336", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19439", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19572", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19618", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19339", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19417", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11753" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1574980", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1574980" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2019-25/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2019-25/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2019-26/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2019-26/" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2019-27/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mozilla.org/security/advisories/mfsa2019-27/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1748659", "reference_id": "1748659", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1748659" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11753", "reference_id": "CVE-2019-11753", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11753" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-25", "reference_id": "mfsa2019-25", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-26", "reference_id": "mfsa2019-26", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-27", "reference_id": "mfsa2019-27", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-27" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582233?format=api", "purl": "pkg:deb/debian/firefox-esr@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api", "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api", "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api", "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5dw5-vpt8-zqbz" }, { "vulnerability": "VCID-9ag7-z86d-nba9" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-qbzp-euvv-q7c7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api", "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2fqb-r5zb-a7dp" }, { "vulnerability": "VCID-3kv6-c148-nkhq" }, { "vulnerability": "VCID-59d3-343b-e3aw" }, { "vulnerability": "VCID-61r1-arbe-dke4" }, { "vulnerability": "VCID-7jt2-zr49-7ye5" }, { "vulnerability": "VCID-95et-ezmb-buau" }, { "vulnerability": "VCID-9nbw-7c9e-13af" }, { "vulnerability": "VCID-av7u-3g4m-mugm" }, { "vulnerability": "VCID-bwth-uepr-z7a3" }, { "vulnerability": "VCID-cjsm-7gxr-8ygw" }, { "vulnerability": "VCID-d16s-p141-qbft" }, { "vulnerability": "VCID-f81v-9fv8-93cd" }, { "vulnerability": "VCID-fxjm-ywug-f3d5" }, { "vulnerability": "VCID-hk2m-rbdy-nqhc" }, { "vulnerability": "VCID-ma29-qa7e-9qb4" }, { "vulnerability": "VCID-nge1-4cvg-zqb2" }, { "vulnerability": "VCID-nyum-jpbc-abew" }, { "vulnerability": "VCID-p6yz-xs58-u3gm" }, { "vulnerability": "VCID-pfmd-zv8f-8bfc" }, { "vulnerability": "VCID-q689-wneh-hbdq" }, { "vulnerability": "VCID-q8qp-5szp-mfe8" }, { "vulnerability": "VCID-ruqn-mk9t-57hb" }, { "vulnerability": "VCID-tv7r-qf2c-dqbm" }, { "vulnerability": "VCID-w98r-yagc-kkec" }, { "vulnerability": "VCID-z6tm-b352-5uhk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076057?format=api", "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f81v-9fv8-93cd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-11753" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zycf-ufab-8yfb" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie" }