Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/firefox@126.0-1?distro=sid
Typedeb
Namespacedebian
Namefirefox
Version126.0-1
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version127.0-1
Latest_non_vulnerable_version150.0-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-11pv-s4za-tbch
vulnerability_id VCID-11pv-s4za-tbch
summary A bug in popup notifications' interaction with WebAuthn made it easier for an attacker to trick a user into granting permissions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4768.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4768.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4768
reference_id
reference_type
scores
0
value 0.00706
scoring_system epss
scoring_elements 0.7223
published_at 2026-04-24T12:55:00Z
1
value 0.00706
scoring_system epss
scoring_elements 0.72187
published_at 2026-04-21T12:55:00Z
2
value 0.00706
scoring_system epss
scoring_elements 0.72113
published_at 2026-04-02T12:55:00Z
3
value 0.00706
scoring_system epss
scoring_elements 0.72181
published_at 2026-04-11T12:55:00Z
4
value 0.00706
scoring_system epss
scoring_elements 0.72159
published_at 2026-04-09T12:55:00Z
5
value 0.00706
scoring_system epss
scoring_elements 0.72147
published_at 2026-04-08T12:55:00Z
6
value 0.00706
scoring_system epss
scoring_elements 0.7211
published_at 2026-04-07T12:55:00Z
7
value 0.00706
scoring_system epss
scoring_elements 0.72133
published_at 2026-04-04T12:55:00Z
8
value 0.00706
scoring_system epss
scoring_elements 0.72202
published_at 2026-04-18T12:55:00Z
9
value 0.00706
scoring_system epss
scoring_elements 0.72193
published_at 2026-04-16T12:55:00Z
10
value 0.00706
scoring_system epss
scoring_elements 0.72152
published_at 2026-04-13T12:55:00Z
11
value 0.00706
scoring_system epss
scoring_elements 0.72166
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4768
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280384
reference_id 2280384
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280384
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
reference_id mfsa2024-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21/
reference_id mfsa2024-21
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:37:43Z/
url https://www.mozilla.org/security/advisories/mfsa2024-21/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
reference_id mfsa2024-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-22/
reference_id mfsa2024-22
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:37:43Z/
url https://www.mozilla.org/security/advisories/mfsa2024-22/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
reference_id mfsa2024-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-23/
reference_id mfsa2024-23
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:37:43Z/
url https://www.mozilla.org/security/advisories/mfsa2024-23/
16
reference_url https://access.redhat.com/errata/RHSA-2024:2881
reference_id RHSA-2024:2881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2881
17
reference_url https://access.redhat.com/errata/RHSA-2024:2882
reference_id RHSA-2024:2882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2882
18
reference_url https://access.redhat.com/errata/RHSA-2024:2883
reference_id RHSA-2024:2883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2883
19
reference_url https://access.redhat.com/errata/RHSA-2024:2884
reference_id RHSA-2024:2884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2884
20
reference_url https://access.redhat.com/errata/RHSA-2024:2885
reference_id RHSA-2024:2885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2885
21
reference_url https://access.redhat.com/errata/RHSA-2024:2886
reference_id RHSA-2024:2886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2886
22
reference_url https://access.redhat.com/errata/RHSA-2024:2887
reference_id RHSA-2024:2887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2887
23
reference_url https://access.redhat.com/errata/RHSA-2024:2888
reference_id RHSA-2024:2888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2888
24
reference_url https://access.redhat.com/errata/RHSA-2024:2903
reference_id RHSA-2024:2903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2903
25
reference_url https://access.redhat.com/errata/RHSA-2024:2904
reference_id RHSA-2024:2904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2904
26
reference_url https://access.redhat.com/errata/RHSA-2024:2905
reference_id RHSA-2024:2905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2905
27
reference_url https://access.redhat.com/errata/RHSA-2024:2906
reference_id RHSA-2024:2906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2906
28
reference_url https://access.redhat.com/errata/RHSA-2024:2911
reference_id RHSA-2024:2911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2911
29
reference_url https://access.redhat.com/errata/RHSA-2024:2912
reference_id RHSA-2024:2912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2912
30
reference_url https://access.redhat.com/errata/RHSA-2024:2913
reference_id RHSA-2024:2913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2913
31
reference_url https://access.redhat.com/errata/RHSA-2024:3338
reference_id RHSA-2024:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3338
32
reference_url https://access.redhat.com/errata/RHSA-2024:3783
reference_id RHSA-2024:3783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3783
33
reference_url https://access.redhat.com/errata/RHSA-2024:3784
reference_id RHSA-2024:3784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3784
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1886082
reference_id show_bug.cgi?id=1886082
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:37:43Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1886082
35
reference_url https://usn.ubuntu.com/6779-1/
reference_id USN-6779-1
reference_type
scores
url https://usn.ubuntu.com/6779-1/
36
reference_url https://usn.ubuntu.com/6782-1/
reference_id USN-6782-1
reference_type
scores
url https://usn.ubuntu.com/6782-1/
fixed_packages
0
url pkg:deb/debian/firefox@126.0-1?distro=sid
purl pkg:deb/debian/firefox@126.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@126.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2024-4768
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-11pv-s4za-tbch
1
url VCID-2q4w-u64u-rbh2
vulnerability_id VCID-2q4w-u64u-rbh2
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4778
reference_id
reference_type
scores
0
value 0.00415
scoring_system epss
scoring_elements 0.61693
published_at 2026-04-24T12:55:00Z
1
value 0.00415
scoring_system epss
scoring_elements 0.6169
published_at 2026-04-12T12:55:00Z
2
value 0.00415
scoring_system epss
scoring_elements 0.61672
published_at 2026-04-13T12:55:00Z
3
value 0.00415
scoring_system epss
scoring_elements 0.61712
published_at 2026-04-16T12:55:00Z
4
value 0.00415
scoring_system epss
scoring_elements 0.61718
published_at 2026-04-18T12:55:00Z
5
value 0.00415
scoring_system epss
scoring_elements 0.61701
published_at 2026-04-21T12:55:00Z
6
value 0.00415
scoring_system epss
scoring_elements 0.61617
published_at 2026-04-07T12:55:00Z
7
value 0.00415
scoring_system epss
scoring_elements 0.61647
published_at 2026-04-04T12:55:00Z
8
value 0.00415
scoring_system epss
scoring_elements 0.61665
published_at 2026-04-08T12:55:00Z
9
value 0.00415
scoring_system epss
scoring_elements 0.6168
published_at 2026-04-09T12:55:00Z
10
value 0.00415
scoring_system epss
scoring_elements 0.61702
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4778
1
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1838834%2C1889291%2C1889595%2C1890204%2C1891545
reference_id buglist.cgi?bug_id=1838834%2C1889291%2C1889595%2C1890204%2C1891545
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-16T18:42:04Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1838834%2C1889291%2C1889595%2C1890204%2C1891545
2
reference_url https://security.gentoo.org/glsa/202408-02
reference_id GLSA-202408-02
reference_type
scores
url https://security.gentoo.org/glsa/202408-02
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
reference_id mfsa2024-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
4
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21/
reference_id mfsa2024-21
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-16T18:42:04Z/
url https://www.mozilla.org/security/advisories/mfsa2024-21/
5
reference_url https://usn.ubuntu.com/6779-1/
reference_id USN-6779-1
reference_type
scores
url https://usn.ubuntu.com/6779-1/
fixed_packages
0
url pkg:deb/debian/firefox@126.0-1?distro=sid
purl pkg:deb/debian/firefox@126.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@126.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2024-4778
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2q4w-u64u-rbh2
2
url VCID-6nrk-u1nq-5ya8
vulnerability_id VCID-6nrk-u1nq-5ya8
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4774
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.11041
published_at 2026-04-24T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.11105
published_at 2026-04-12T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.11083
published_at 2026-04-13T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.10946
published_at 2026-04-16T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.10957
published_at 2026-04-18T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.11095
published_at 2026-04-21T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.11115
published_at 2026-04-02T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.11178
published_at 2026-04-04T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.11
published_at 2026-04-07T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.11079
published_at 2026-04-08T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.11134
published_at 2026-04-09T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.11138
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4774
1
reference_url https://security.gentoo.org/glsa/202408-02
reference_id GLSA-202408-02
reference_type
scores
url https://security.gentoo.org/glsa/202408-02
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
reference_id mfsa2024-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
3
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21/
reference_id mfsa2024-21
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T19:31:39Z/
url https://www.mozilla.org/security/advisories/mfsa2024-21/
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1886598
reference_id show_bug.cgi?id=1886598
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T19:31:39Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1886598
5
reference_url https://usn.ubuntu.com/6779-1/
reference_id USN-6779-1
reference_type
scores
url https://usn.ubuntu.com/6779-1/
fixed_packages
0
url pkg:deb/debian/firefox@126.0-1?distro=sid
purl pkg:deb/debian/firefox@126.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@126.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2024-4774
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6nrk-u1nq-5ya8
3
url VCID-7zqn-1txc-r3d2
vulnerability_id VCID-7zqn-1txc-r3d2
summary When saving a page to PDF, certain font styles could have led to a potential use-after-free crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4770.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4770.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4770
reference_id
reference_type
scores
0
value 0.00464
scoring_system epss
scoring_elements 0.64387
published_at 2026-04-24T12:55:00Z
1
value 0.00464
scoring_system epss
scoring_elements 0.64368
published_at 2026-04-21T12:55:00Z
2
value 0.00464
scoring_system epss
scoring_elements 0.64376
published_at 2026-04-18T12:55:00Z
3
value 0.00464
scoring_system epss
scoring_elements 0.64365
published_at 2026-04-16T12:55:00Z
4
value 0.00464
scoring_system epss
scoring_elements 0.64308
published_at 2026-04-02T12:55:00Z
5
value 0.00464
scoring_system epss
scoring_elements 0.64342
published_at 2026-04-08T12:55:00Z
6
value 0.00464
scoring_system epss
scoring_elements 0.64294
published_at 2026-04-07T12:55:00Z
7
value 0.00464
scoring_system epss
scoring_elements 0.64336
published_at 2026-04-04T12:55:00Z
8
value 0.00464
scoring_system epss
scoring_elements 0.64329
published_at 2026-04-13T12:55:00Z
9
value 0.00464
scoring_system epss
scoring_elements 0.64358
published_at 2026-04-12T12:55:00Z
10
value 0.00464
scoring_system epss
scoring_elements 0.64369
published_at 2026-04-11T12:55:00Z
11
value 0.00464
scoring_system epss
scoring_elements 0.64357
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4770
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280386
reference_id 2280386
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280386
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
reference_id mfsa2024-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21/
reference_id mfsa2024-21
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:03:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-21/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
reference_id mfsa2024-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-22/
reference_id mfsa2024-22
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:03:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-22/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
reference_id mfsa2024-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-23/
reference_id mfsa2024-23
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:03:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-23/
16
reference_url https://access.redhat.com/errata/RHSA-2024:2881
reference_id RHSA-2024:2881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2881
17
reference_url https://access.redhat.com/errata/RHSA-2024:2882
reference_id RHSA-2024:2882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2882
18
reference_url https://access.redhat.com/errata/RHSA-2024:2883
reference_id RHSA-2024:2883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2883
19
reference_url https://access.redhat.com/errata/RHSA-2024:2884
reference_id RHSA-2024:2884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2884
20
reference_url https://access.redhat.com/errata/RHSA-2024:2885
reference_id RHSA-2024:2885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2885
21
reference_url https://access.redhat.com/errata/RHSA-2024:2886
reference_id RHSA-2024:2886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2886
22
reference_url https://access.redhat.com/errata/RHSA-2024:2887
reference_id RHSA-2024:2887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2887
23
reference_url https://access.redhat.com/errata/RHSA-2024:2888
reference_id RHSA-2024:2888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2888
24
reference_url https://access.redhat.com/errata/RHSA-2024:2903
reference_id RHSA-2024:2903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2903
25
reference_url https://access.redhat.com/errata/RHSA-2024:2904
reference_id RHSA-2024:2904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2904
26
reference_url https://access.redhat.com/errata/RHSA-2024:2905
reference_id RHSA-2024:2905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2905
27
reference_url https://access.redhat.com/errata/RHSA-2024:2906
reference_id RHSA-2024:2906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2906
28
reference_url https://access.redhat.com/errata/RHSA-2024:2911
reference_id RHSA-2024:2911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2911
29
reference_url https://access.redhat.com/errata/RHSA-2024:2912
reference_id RHSA-2024:2912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2912
30
reference_url https://access.redhat.com/errata/RHSA-2024:2913
reference_id RHSA-2024:2913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2913
31
reference_url https://access.redhat.com/errata/RHSA-2024:3338
reference_id RHSA-2024:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3338
32
reference_url https://access.redhat.com/errata/RHSA-2024:3783
reference_id RHSA-2024:3783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3783
33
reference_url https://access.redhat.com/errata/RHSA-2024:3784
reference_id RHSA-2024:3784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3784
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1893270
reference_id show_bug.cgi?id=1893270
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:03:13Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1893270
35
reference_url https://usn.ubuntu.com/6779-1/
reference_id USN-6779-1
reference_type
scores
url https://usn.ubuntu.com/6779-1/
36
reference_url https://usn.ubuntu.com/6782-1/
reference_id USN-6782-1
reference_type
scores
url https://usn.ubuntu.com/6782-1/
fixed_packages
0
url pkg:deb/debian/firefox@126.0-1?distro=sid
purl pkg:deb/debian/firefox@126.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@126.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2024-4770
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7zqn-1txc-r3d2
4
url VCID-8988-upt6-tfgw
vulnerability_id VCID-8988-upt6-tfgw
summary A malicious website could have included an iframe with an malformed URI resulting in a non-exploitable browser crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10941.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10941.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10941
reference_id
reference_type
scores
0
value 0.00244
scoring_system epss
scoring_elements 0.47613
published_at 2026-04-24T12:55:00Z
1
value 0.00244
scoring_system epss
scoring_elements 0.47621
published_at 2026-04-12T12:55:00Z
2
value 0.00244
scoring_system epss
scoring_elements 0.47571
published_at 2026-04-07T12:55:00Z
3
value 0.00244
scoring_system epss
scoring_elements 0.47625
published_at 2026-04-08T12:55:00Z
4
value 0.00244
scoring_system epss
scoring_elements 0.47645
published_at 2026-04-11T12:55:00Z
5
value 0.00244
scoring_system epss
scoring_elements 0.4763
published_at 2026-04-13T12:55:00Z
6
value 0.00244
scoring_system epss
scoring_elements 0.47687
published_at 2026-04-16T12:55:00Z
7
value 0.00244
scoring_system epss
scoring_elements 0.47679
published_at 2026-04-18T12:55:00Z
8
value 0.00244
scoring_system epss
scoring_elements 0.47633
published_at 2026-04-21T12:55:00Z
9
value 0.00244
scoring_system epss
scoring_elements 0.476
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10941
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2324251
reference_id 2324251
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2324251
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
reference_id mfsa2024-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
5
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21/
reference_id mfsa2024-21
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-07T18:42:18Z/
url https://www.mozilla.org/security/advisories/mfsa2024-21/
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1880879
reference_id show_bug.cgi?id=1880879
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-07T18:42:18Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1880879
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1887614
reference_id show_bug.cgi?id=1887614
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-07T18:42:18Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1887614
fixed_packages
0
url pkg:deb/debian/firefox@126.0-1?distro=sid
purl pkg:deb/debian/firefox@126.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@126.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2024-10941
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8988-upt6-tfgw
5
url VCID-89es-k3ja-1be1
vulnerability_id VCID-89es-k3ja-1be1
summary
PDF.js vulnerable to arbitrary JavaScript execution upon opening a malicious PDF
### Impact
If pdf.js is used to load a malicious PDF, and PDF.js is configured with `isEvalSupported` set to `true` (which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain.

### Patches
The patch removes the use of `eval`:
https://github.com/mozilla/pdf.js/pull/18015

### Workarounds
Set the option `isEvalSupported` to `false`. 

### References
https://bugzilla.mozilla.org/show_bug.cgi?id=1893645
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4367.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4367.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4367
reference_id
reference_type
scores
0
value 0.34613
scoring_system epss
scoring_elements 0.9702
published_at 2026-04-24T12:55:00Z
1
value 0.34613
scoring_system epss
scoring_elements 0.97016
published_at 2026-04-18T12:55:00Z
2
value 0.34613
scoring_system epss
scoring_elements 0.97012
published_at 2026-04-16T12:55:00Z
3
value 0.34613
scoring_system epss
scoring_elements 0.97003
published_at 2026-04-13T12:55:00Z
4
value 0.34613
scoring_system epss
scoring_elements 0.97001
published_at 2026-04-11T12:55:00Z
5
value 0.34613
scoring_system epss
scoring_elements 0.96999
published_at 2026-04-09T12:55:00Z
6
value 0.34613
scoring_system epss
scoring_elements 0.96998
published_at 2026-04-08T12:55:00Z
7
value 0.34613
scoring_system epss
scoring_elements 0.9699
published_at 2026-04-07T12:55:00Z
8
value 0.34613
scoring_system epss
scoring_elements 0.96988
published_at 2026-04-04T12:55:00Z
9
value 0.34613
scoring_system epss
scoring_elements 0.96984
published_at 2026-04-02T12:55:00Z
10
value 0.35178
scoring_system epss
scoring_elements 0.97051
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4367
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1893645
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-26T04:55:26Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1893645
3
reference_url https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
10
reference_url http://seclists.org/fulldisclosure/2024/Aug/30
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2024/Aug/30
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://github.com/gogs/gogs/issues/7928
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/gogs/gogs/issues/7928
13
reference_url https://github.com/mozilla/pdf.js
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mozilla/pdf.js
14
reference_url https://github.com/mozilla/pdf.js/commit/85e64b5c16c9aaef738f421733c12911a441cec6
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mozilla/pdf.js/commit/85e64b5c16c9aaef738f421733c12911a441cec6
15
reference_url https://github.com/mozilla/pdf.js/pull/18015
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mozilla/pdf.js/pull/18015
16
reference_url https://github.com/mozilla/pdf.js/releases/tag/v4.2.67
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mozilla/pdf.js/releases/tag/v4.2.67
17
reference_url https://github.com/mozilla/pdf.js/security/advisories/GHSA-wgrm-67xf-hhpq
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mozilla/pdf.js/security/advisories/GHSA-wgrm-67xf-hhpq
18
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00010.html
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-26T04:55:26Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00010.html
19
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00012.html
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-26T04:55:26Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00012.html
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-4367
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-4367
21
reference_url https://www.exploit-db.com/exploits/52273
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.exploit-db.com/exploits/52273
22
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/security/advisories/mfsa2024-21
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-22
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/security/advisories/mfsa2024-22
24
reference_url https://www.mozilla.org/security/advisories/mfsa2024-23
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/security/advisories/mfsa2024-23
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074228
reference_id 1074228
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074228
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280382
reference_id 2280382
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280382
27
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/52273.py
reference_id CVE-2024-4367
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/52273.py
28
reference_url https://github.com/advisories/GHSA-wgrm-67xf-hhpq
reference_id GHSA-wgrm-67xf-hhpq
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-wgrm-67xf-hhpq
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
reference_id mfsa2024-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
30
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21/
reference_id mfsa2024-21
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-26T04:55:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-21/
31
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
reference_id mfsa2024-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
32
reference_url https://www.mozilla.org/security/advisories/mfsa2024-22/
reference_id mfsa2024-22
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-26T04:55:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-22/
33
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
reference_id mfsa2024-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
34
reference_url https://www.mozilla.org/security/advisories/mfsa2024-23/
reference_id mfsa2024-23
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-26T04:55:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-23/
35
reference_url https://access.redhat.com/errata/RHSA-2024:2881
reference_id RHSA-2024:2881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2881
36
reference_url https://access.redhat.com/errata/RHSA-2024:2882
reference_id RHSA-2024:2882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2882
37
reference_url https://access.redhat.com/errata/RHSA-2024:2883
reference_id RHSA-2024:2883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2883
38
reference_url https://access.redhat.com/errata/RHSA-2024:2884
reference_id RHSA-2024:2884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2884
39
reference_url https://access.redhat.com/errata/RHSA-2024:2885
reference_id RHSA-2024:2885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2885
40
reference_url https://access.redhat.com/errata/RHSA-2024:2886
reference_id RHSA-2024:2886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2886
41
reference_url https://access.redhat.com/errata/RHSA-2024:2887
reference_id RHSA-2024:2887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2887
42
reference_url https://access.redhat.com/errata/RHSA-2024:2888
reference_id RHSA-2024:2888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2888
43
reference_url https://access.redhat.com/errata/RHSA-2024:2903
reference_id RHSA-2024:2903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2903
44
reference_url https://access.redhat.com/errata/RHSA-2024:2904
reference_id RHSA-2024:2904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2904
45
reference_url https://access.redhat.com/errata/RHSA-2024:2905
reference_id RHSA-2024:2905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2905
46
reference_url https://access.redhat.com/errata/RHSA-2024:2906
reference_id RHSA-2024:2906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2906
47
reference_url https://access.redhat.com/errata/RHSA-2024:2911
reference_id RHSA-2024:2911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2911
48
reference_url https://access.redhat.com/errata/RHSA-2024:2912
reference_id RHSA-2024:2912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2912
49
reference_url https://access.redhat.com/errata/RHSA-2024:2913
reference_id RHSA-2024:2913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2913
50
reference_url https://access.redhat.com/errata/RHSA-2024:3338
reference_id RHSA-2024:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3338
51
reference_url https://access.redhat.com/errata/RHSA-2024:3783
reference_id RHSA-2024:3783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3783
52
reference_url https://access.redhat.com/errata/RHSA-2024:3784
reference_id RHSA-2024:3784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3784
53
reference_url https://usn.ubuntu.com/6779-1/
reference_id USN-6779-1
reference_type
scores
url https://usn.ubuntu.com/6779-1/
54
reference_url https://usn.ubuntu.com/6782-1/
reference_id USN-6782-1
reference_type
scores
url https://usn.ubuntu.com/6782-1/
fixed_packages
0
url pkg:deb/debian/firefox@126.0-1?distro=sid
purl pkg:deb/debian/firefox@126.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@126.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2024-4367, GHSA-wgrm-67xf-hhpq
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-89es-k3ja-1be1
6
url VCID-aeku-1hmt-akbc
vulnerability_id VCID-aeku-1hmt-akbc
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4764
reference_id
reference_type
scores
0
value 0.00539
scoring_system epss
scoring_elements 0.67626
published_at 2026-04-24T12:55:00Z
1
value 0.00539
scoring_system epss
scoring_elements 0.67605
published_at 2026-04-09T12:55:00Z
2
value 0.00539
scoring_system epss
scoring_elements 0.67628
published_at 2026-04-18T12:55:00Z
3
value 0.00539
scoring_system epss
scoring_elements 0.67614
published_at 2026-04-12T12:55:00Z
4
value 0.00539
scoring_system epss
scoring_elements 0.67581
published_at 2026-04-13T12:55:00Z
5
value 0.00539
scoring_system epss
scoring_elements 0.67616
published_at 2026-04-16T12:55:00Z
6
value 0.00539
scoring_system epss
scoring_elements 0.67607
published_at 2026-04-21T12:55:00Z
7
value 0.00539
scoring_system epss
scoring_elements 0.67541
published_at 2026-04-02T12:55:00Z
8
value 0.00539
scoring_system epss
scoring_elements 0.67562
published_at 2026-04-04T12:55:00Z
9
value 0.00539
scoring_system epss
scoring_elements 0.6754
published_at 2026-04-07T12:55:00Z
10
value 0.00539
scoring_system epss
scoring_elements 0.67592
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4764
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.gentoo.org/glsa/202408-02
reference_id GLSA-202408-02
reference_type
scores
url https://security.gentoo.org/glsa/202408-02
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
reference_id mfsa2024-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
4
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21/
reference_id mfsa2024-21
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-14T19:02:29Z/
url https://www.mozilla.org/security/advisories/mfsa2024-21/
5
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1879093
reference_id show_bug.cgi?id=1879093
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-14T19:02:29Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1879093
6
reference_url https://usn.ubuntu.com/6779-1/
reference_id USN-6779-1
reference_type
scores
url https://usn.ubuntu.com/6779-1/
fixed_packages
0
url pkg:deb/debian/firefox@126.0-1?distro=sid
purl pkg:deb/debian/firefox@126.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@126.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2024-4764
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aeku-1hmt-akbc
7
url VCID-b3zg-y242-xybq
vulnerability_id VCID-b3zg-y242-xybq
summary If the browser.privatebrowsing.autostart preference is enabled, IndexedDB files were not properly deleted when the window was closed. This preference is disabled by default in Firefox.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4767.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4767.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4767
reference_id
reference_type
scores
0
value 0.00872
scoring_system epss
scoring_elements 0.75289
published_at 2026-04-24T12:55:00Z
1
value 0.00872
scoring_system epss
scoring_elements 0.75253
published_at 2026-04-21T12:55:00Z
2
value 0.00872
scoring_system epss
scoring_elements 0.75176
published_at 2026-04-02T12:55:00Z
3
value 0.00872
scoring_system epss
scoring_elements 0.75251
published_at 2026-04-11T12:55:00Z
4
value 0.00872
scoring_system epss
scoring_elements 0.7523
published_at 2026-04-09T12:55:00Z
5
value 0.00872
scoring_system epss
scoring_elements 0.75218
published_at 2026-04-08T12:55:00Z
6
value 0.00872
scoring_system epss
scoring_elements 0.75184
published_at 2026-04-07T12:55:00Z
7
value 0.00872
scoring_system epss
scoring_elements 0.75207
published_at 2026-04-04T12:55:00Z
8
value 0.00872
scoring_system epss
scoring_elements 0.75262
published_at 2026-04-18T12:55:00Z
9
value 0.00872
scoring_system epss
scoring_elements 0.75256
published_at 2026-04-16T12:55:00Z
10
value 0.00872
scoring_system epss
scoring_elements 0.75217
published_at 2026-04-13T12:55:00Z
11
value 0.00872
scoring_system epss
scoring_elements 0.75229
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4767
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280383
reference_id 2280383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280383
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
reference_id mfsa2024-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21/
reference_id mfsa2024-21
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T14:46:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-21/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
reference_id mfsa2024-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-22/
reference_id mfsa2024-22
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T14:46:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-22/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
reference_id mfsa2024-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-23/
reference_id mfsa2024-23
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T14:46:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-23/
16
reference_url https://access.redhat.com/errata/RHSA-2024:2881
reference_id RHSA-2024:2881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2881
17
reference_url https://access.redhat.com/errata/RHSA-2024:2882
reference_id RHSA-2024:2882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2882
18
reference_url https://access.redhat.com/errata/RHSA-2024:2883
reference_id RHSA-2024:2883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2883
19
reference_url https://access.redhat.com/errata/RHSA-2024:2884
reference_id RHSA-2024:2884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2884
20
reference_url https://access.redhat.com/errata/RHSA-2024:2885
reference_id RHSA-2024:2885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2885
21
reference_url https://access.redhat.com/errata/RHSA-2024:2886
reference_id RHSA-2024:2886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2886
22
reference_url https://access.redhat.com/errata/RHSA-2024:2887
reference_id RHSA-2024:2887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2887
23
reference_url https://access.redhat.com/errata/RHSA-2024:2888
reference_id RHSA-2024:2888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2888
24
reference_url https://access.redhat.com/errata/RHSA-2024:2903
reference_id RHSA-2024:2903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2903
25
reference_url https://access.redhat.com/errata/RHSA-2024:2904
reference_id RHSA-2024:2904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2904
26
reference_url https://access.redhat.com/errata/RHSA-2024:2905
reference_id RHSA-2024:2905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2905
27
reference_url https://access.redhat.com/errata/RHSA-2024:2906
reference_id RHSA-2024:2906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2906
28
reference_url https://access.redhat.com/errata/RHSA-2024:2911
reference_id RHSA-2024:2911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2911
29
reference_url https://access.redhat.com/errata/RHSA-2024:2912
reference_id RHSA-2024:2912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2912
30
reference_url https://access.redhat.com/errata/RHSA-2024:2913
reference_id RHSA-2024:2913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2913
31
reference_url https://access.redhat.com/errata/RHSA-2024:3338
reference_id RHSA-2024:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3338
32
reference_url https://access.redhat.com/errata/RHSA-2024:3783
reference_id RHSA-2024:3783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3783
33
reference_url https://access.redhat.com/errata/RHSA-2024:3784
reference_id RHSA-2024:3784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3784
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1878577
reference_id show_bug.cgi?id=1878577
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T14:46:26Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1878577
35
reference_url https://usn.ubuntu.com/6779-1/
reference_id USN-6779-1
reference_type
scores
url https://usn.ubuntu.com/6779-1/
36
reference_url https://usn.ubuntu.com/6782-1/
reference_id USN-6782-1
reference_type
scores
url https://usn.ubuntu.com/6782-1/
fixed_packages
0
url pkg:deb/debian/firefox@126.0-1?distro=sid
purl pkg:deb/debian/firefox@126.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@126.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2024-4767
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b3zg-y242-xybq
8
url VCID-esw4-827s-u3f1
vulnerability_id VCID-esw4-827s-u3f1
summary When importing resources using Web Workers, error messages would distinguish the difference between application/javascript responses and non-script responses. This could have been abused to learn information cross-origin.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4769.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4769.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4769
reference_id
reference_type
scores
0
value 0.00693
scoring_system epss
scoring_elements 0.71915
published_at 2026-04-24T12:55:00Z
1
value 0.00693
scoring_system epss
scoring_elements 0.7187
published_at 2026-04-21T12:55:00Z
2
value 0.0083
scoring_system epss
scoring_elements 0.74488
published_at 2026-04-02T12:55:00Z
3
value 0.0083
scoring_system epss
scoring_elements 0.74558
published_at 2026-04-11T12:55:00Z
4
value 0.0083
scoring_system epss
scoring_elements 0.74536
published_at 2026-04-09T12:55:00Z
5
value 0.0083
scoring_system epss
scoring_elements 0.74521
published_at 2026-04-08T12:55:00Z
6
value 0.0083
scoring_system epss
scoring_elements 0.74489
published_at 2026-04-07T12:55:00Z
7
value 0.0083
scoring_system epss
scoring_elements 0.74514
published_at 2026-04-04T12:55:00Z
8
value 0.0083
scoring_system epss
scoring_elements 0.74576
published_at 2026-04-18T12:55:00Z
9
value 0.0083
scoring_system epss
scoring_elements 0.74569
published_at 2026-04-16T12:55:00Z
10
value 0.0083
scoring_system epss
scoring_elements 0.74531
published_at 2026-04-13T12:55:00Z
11
value 0.0083
scoring_system epss
scoring_elements 0.74539
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4769
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280385
reference_id 2280385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280385
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
reference_id mfsa2024-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21/
reference_id mfsa2024-21
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-15T15:22:42Z/
url https://www.mozilla.org/security/advisories/mfsa2024-21/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
reference_id mfsa2024-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-22/
reference_id mfsa2024-22
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-15T15:22:42Z/
url https://www.mozilla.org/security/advisories/mfsa2024-22/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
reference_id mfsa2024-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-23/
reference_id mfsa2024-23
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-15T15:22:42Z/
url https://www.mozilla.org/security/advisories/mfsa2024-23/
16
reference_url https://access.redhat.com/errata/RHSA-2024:2881
reference_id RHSA-2024:2881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2881
17
reference_url https://access.redhat.com/errata/RHSA-2024:2882
reference_id RHSA-2024:2882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2882
18
reference_url https://access.redhat.com/errata/RHSA-2024:2883
reference_id RHSA-2024:2883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2883
19
reference_url https://access.redhat.com/errata/RHSA-2024:2884
reference_id RHSA-2024:2884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2884
20
reference_url https://access.redhat.com/errata/RHSA-2024:2885
reference_id RHSA-2024:2885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2885
21
reference_url https://access.redhat.com/errata/RHSA-2024:2886
reference_id RHSA-2024:2886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2886
22
reference_url https://access.redhat.com/errata/RHSA-2024:2887
reference_id RHSA-2024:2887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2887
23
reference_url https://access.redhat.com/errata/RHSA-2024:2888
reference_id RHSA-2024:2888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2888
24
reference_url https://access.redhat.com/errata/RHSA-2024:2903
reference_id RHSA-2024:2903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2903
25
reference_url https://access.redhat.com/errata/RHSA-2024:2904
reference_id RHSA-2024:2904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2904
26
reference_url https://access.redhat.com/errata/RHSA-2024:2905
reference_id RHSA-2024:2905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2905
27
reference_url https://access.redhat.com/errata/RHSA-2024:2906
reference_id RHSA-2024:2906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2906
28
reference_url https://access.redhat.com/errata/RHSA-2024:2911
reference_id RHSA-2024:2911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2911
29
reference_url https://access.redhat.com/errata/RHSA-2024:2912
reference_id RHSA-2024:2912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2912
30
reference_url https://access.redhat.com/errata/RHSA-2024:2913
reference_id RHSA-2024:2913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2913
31
reference_url https://access.redhat.com/errata/RHSA-2024:3338
reference_id RHSA-2024:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3338
32
reference_url https://access.redhat.com/errata/RHSA-2024:3783
reference_id RHSA-2024:3783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3783
33
reference_url https://access.redhat.com/errata/RHSA-2024:3784
reference_id RHSA-2024:3784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3784
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1886108
reference_id show_bug.cgi?id=1886108
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-15T15:22:42Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1886108
35
reference_url https://usn.ubuntu.com/6779-1/
reference_id USN-6779-1
reference_type
scores
url https://usn.ubuntu.com/6779-1/
36
reference_url https://usn.ubuntu.com/6782-1/
reference_id USN-6782-1
reference_type
scores
url https://usn.ubuntu.com/6782-1/
fixed_packages
0
url pkg:deb/debian/firefox@126.0-1?distro=sid
purl pkg:deb/debian/firefox@126.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@126.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2024-4769
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-esw4-827s-u3f1
9
url VCID-hehb-ttkd-nbb6
vulnerability_id VCID-hehb-ttkd-nbb6
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4772
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18162
published_at 2026-04-24T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.1838
published_at 2026-04-11T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18332
published_at 2026-04-12T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.1828
published_at 2026-04-13T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18224
published_at 2026-04-16T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18236
published_at 2026-04-18T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18263
published_at 2026-04-21T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18481
published_at 2026-04-02T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18535
published_at 2026-04-04T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18245
published_at 2026-04-07T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18328
published_at 2026-04-08T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18381
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4772
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.gentoo.org/glsa/202408-02
reference_id GLSA-202408-02
reference_type
scores
url https://security.gentoo.org/glsa/202408-02
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
reference_id mfsa2024-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
4
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21/
reference_id mfsa2024-21
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:24:50Z/
url https://www.mozilla.org/security/advisories/mfsa2024-21/
5
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1870579
reference_id show_bug.cgi?id=1870579
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:24:50Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1870579
6
reference_url https://usn.ubuntu.com/6779-1/
reference_id USN-6779-1
reference_type
scores
url https://usn.ubuntu.com/6779-1/
fixed_packages
0
url pkg:deb/debian/firefox@126.0-1?distro=sid
purl pkg:deb/debian/firefox@126.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@126.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2024-4772
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hehb-ttkd-nbb6
10
url VCID-kavx-hnua-aff7
vulnerability_id VCID-kavx-hnua-aff7
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4771
reference_id
reference_type
scores
0
value 0.00624
scoring_system epss
scoring_elements 0.70233
published_at 2026-04-24T12:55:00Z
1
value 0.00624
scoring_system epss
scoring_elements 0.70178
published_at 2026-04-11T12:55:00Z
2
value 0.00624
scoring_system epss
scoring_elements 0.70163
published_at 2026-04-12T12:55:00Z
3
value 0.00624
scoring_system epss
scoring_elements 0.70151
published_at 2026-04-13T12:55:00Z
4
value 0.00624
scoring_system epss
scoring_elements 0.70194
published_at 2026-04-16T12:55:00Z
5
value 0.00624
scoring_system epss
scoring_elements 0.70203
published_at 2026-04-18T12:55:00Z
6
value 0.00624
scoring_system epss
scoring_elements 0.70182
published_at 2026-04-21T12:55:00Z
7
value 0.00624
scoring_system epss
scoring_elements 0.70099
published_at 2026-04-02T12:55:00Z
8
value 0.00624
scoring_system epss
scoring_elements 0.70114
published_at 2026-04-04T12:55:00Z
9
value 0.00624
scoring_system epss
scoring_elements 0.70091
published_at 2026-04-07T12:55:00Z
10
value 0.00624
scoring_system epss
scoring_elements 0.70138
published_at 2026-04-08T12:55:00Z
11
value 0.00624
scoring_system epss
scoring_elements 0.70154
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4771
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.gentoo.org/glsa/202408-02
reference_id GLSA-202408-02
reference_type
scores
url https://security.gentoo.org/glsa/202408-02
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
reference_id mfsa2024-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
4
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21/
reference_id mfsa2024-21
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-15T15:40:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-21/
5
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1893891
reference_id show_bug.cgi?id=1893891
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-15T15:40:13Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1893891
6
reference_url https://usn.ubuntu.com/6779-1/
reference_id USN-6779-1
reference_type
scores
url https://usn.ubuntu.com/6779-1/
fixed_packages
0
url pkg:deb/debian/firefox@126.0-1?distro=sid
purl pkg:deb/debian/firefox@126.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@126.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2024-4771
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kavx-hnua-aff7
11
url VCID-mm2u-njbv-ckfb
vulnerability_id VCID-mm2u-njbv-ckfb
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4773
reference_id
reference_type
scores
0
value 0.00296
scoring_system epss
scoring_elements 0.52956
published_at 2026-04-11T12:55:00Z
1
value 0.00296
scoring_system epss
scoring_elements 0.52969
published_at 2026-04-18T12:55:00Z
2
value 0.00296
scoring_system epss
scoring_elements 0.52961
published_at 2026-04-16T12:55:00Z
3
value 0.00296
scoring_system epss
scoring_elements 0.52924
published_at 2026-04-13T12:55:00Z
4
value 0.00296
scoring_system epss
scoring_elements 0.5294
published_at 2026-04-12T12:55:00Z
5
value 0.00296
scoring_system epss
scoring_elements 0.52867
published_at 2026-04-02T12:55:00Z
6
value 0.00296
scoring_system epss
scoring_elements 0.52894
published_at 2026-04-04T12:55:00Z
7
value 0.00296
scoring_system epss
scoring_elements 0.52862
published_at 2026-04-07T12:55:00Z
8
value 0.00296
scoring_system epss
scoring_elements 0.52913
published_at 2026-04-08T12:55:00Z
9
value 0.00296
scoring_system epss
scoring_elements 0.52906
published_at 2026-04-09T12:55:00Z
10
value 0.00387
scoring_system epss
scoring_elements 0.59838
published_at 2026-04-24T12:55:00Z
11
value 0.00387
scoring_system epss
scoring_elements 0.59867
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4773
1
reference_url https://security.gentoo.org/glsa/202408-02
reference_id GLSA-202408-02
reference_type
scores
url https://security.gentoo.org/glsa/202408-02
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
reference_id mfsa2024-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
3
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21/
reference_id mfsa2024-21
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-15T14:13:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-21/
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1875248
reference_id show_bug.cgi?id=1875248
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-15T14:13:57Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1875248
5
reference_url https://usn.ubuntu.com/6779-1/
reference_id USN-6779-1
reference_type
scores
url https://usn.ubuntu.com/6779-1/
fixed_packages
0
url pkg:deb/debian/firefox@126.0-1?distro=sid
purl pkg:deb/debian/firefox@126.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@126.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2024-4773
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mm2u-njbv-ckfb
12
url VCID-s3cz-gvd7-kkcc
vulnerability_id VCID-s3cz-gvd7-kkcc
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4775
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.2003
published_at 2026-04-24T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20214
published_at 2026-04-12T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20154
published_at 2026-04-13T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20146
published_at 2026-04-16T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.2015
published_at 2026-04-18T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20149
published_at 2026-04-21T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20313
published_at 2026-04-02T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20372
published_at 2026-04-04T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20095
published_at 2026-04-07T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20176
published_at 2026-04-08T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20235
published_at 2026-04-09T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.20259
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4775
1
reference_url https://security.gentoo.org/glsa/202408-02
reference_id GLSA-202408-02
reference_type
scores
url https://security.gentoo.org/glsa/202408-02
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
reference_id mfsa2024-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
3
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21/
reference_id mfsa2024-21
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-15T15:07:39Z/
url https://www.mozilla.org/security/advisories/mfsa2024-21/
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1887332
reference_id show_bug.cgi?id=1887332
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-15T15:07:39Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1887332
5
reference_url https://usn.ubuntu.com/6779-1/
reference_id USN-6779-1
reference_type
scores
url https://usn.ubuntu.com/6779-1/
fixed_packages
0
url pkg:deb/debian/firefox@126.0-1?distro=sid
purl pkg:deb/debian/firefox@126.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@126.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2024-4775
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s3cz-gvd7-kkcc
13
url VCID-vfsu-6m2n-rkfy
vulnerability_id VCID-vfsu-6m2n-rkfy
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4776
reference_id
reference_type
scores
0
value 0.00607
scoring_system epss
scoring_elements 0.69757
published_at 2026-04-24T12:55:00Z
1
value 0.00607
scoring_system epss
scoring_elements 0.69687
published_at 2026-04-12T12:55:00Z
2
value 0.00607
scoring_system epss
scoring_elements 0.69674
published_at 2026-04-13T12:55:00Z
3
value 0.00607
scoring_system epss
scoring_elements 0.69715
published_at 2026-04-16T12:55:00Z
4
value 0.00607
scoring_system epss
scoring_elements 0.69723
published_at 2026-04-18T12:55:00Z
5
value 0.00607
scoring_system epss
scoring_elements 0.69704
published_at 2026-04-21T12:55:00Z
6
value 0.00607
scoring_system epss
scoring_elements 0.69618
published_at 2026-04-02T12:55:00Z
7
value 0.00607
scoring_system epss
scoring_elements 0.69634
published_at 2026-04-04T12:55:00Z
8
value 0.00607
scoring_system epss
scoring_elements 0.69612
published_at 2026-04-07T12:55:00Z
9
value 0.00607
scoring_system epss
scoring_elements 0.69663
published_at 2026-04-08T12:55:00Z
10
value 0.00607
scoring_system epss
scoring_elements 0.69681
published_at 2026-04-09T12:55:00Z
11
value 0.00607
scoring_system epss
scoring_elements 0.69703
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4776
1
reference_url https://security.gentoo.org/glsa/202408-02
reference_id GLSA-202408-02
reference_type
scores
url https://security.gentoo.org/glsa/202408-02
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
reference_id mfsa2024-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
3
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21/
reference_id mfsa2024-21
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-15T14:16:16Z/
url https://www.mozilla.org/security/advisories/mfsa2024-21/
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1887343
reference_id show_bug.cgi?id=1887343
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-15T14:16:16Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1887343
5
reference_url https://usn.ubuntu.com/6779-1/
reference_id USN-6779-1
reference_type
scores
url https://usn.ubuntu.com/6779-1/
fixed_packages
0
url pkg:deb/debian/firefox@126.0-1?distro=sid
purl pkg:deb/debian/firefox@126.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@126.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2024-4776
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vfsu-6m2n-rkfy
14
url VCID-yb18-qe5e-dbck
vulnerability_id VCID-yb18-qe5e-dbck
summary Memory safety bugs present in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4777.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4777.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4777
reference_id
reference_type
scores
0
value 0.00656
scoring_system epss
scoring_elements 0.71089
published_at 2026-04-24T12:55:00Z
1
value 0.00656
scoring_system epss
scoring_elements 0.71034
published_at 2026-04-21T12:55:00Z
2
value 0.00656
scoring_system epss
scoring_elements 0.70961
published_at 2026-04-02T12:55:00Z
3
value 0.00656
scoring_system epss
scoring_elements 0.71033
published_at 2026-04-11T12:55:00Z
4
value 0.00656
scoring_system epss
scoring_elements 0.71011
published_at 2026-04-09T12:55:00Z
5
value 0.00656
scoring_system epss
scoring_elements 0.70996
published_at 2026-04-08T12:55:00Z
6
value 0.00656
scoring_system epss
scoring_elements 0.70954
published_at 2026-04-07T12:55:00Z
7
value 0.00656
scoring_system epss
scoring_elements 0.70979
published_at 2026-04-04T12:55:00Z
8
value 0.00656
scoring_system epss
scoring_elements 0.71054
published_at 2026-04-18T12:55:00Z
9
value 0.00656
scoring_system epss
scoring_elements 0.71047
published_at 2026-04-16T12:55:00Z
10
value 0.00656
scoring_system epss
scoring_elements 0.71001
published_at 2026-04-13T12:55:00Z
11
value 0.00656
scoring_system epss
scoring_elements 0.71018
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4777
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280387
reference_id 2280387
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280387
10
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1878199%2C1893340
reference_id buglist.cgi?bug_id=1878199%2C1893340
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:05:30Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1878199%2C1893340
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
reference_id mfsa2024-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21/
reference_id mfsa2024-21
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:05:30Z/
url https://www.mozilla.org/security/advisories/mfsa2024-21/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
reference_id mfsa2024-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-22/
reference_id mfsa2024-22
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:05:30Z/
url https://www.mozilla.org/security/advisories/mfsa2024-22/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
reference_id mfsa2024-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-23/
reference_id mfsa2024-23
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:05:30Z/
url https://www.mozilla.org/security/advisories/mfsa2024-23/
17
reference_url https://access.redhat.com/errata/RHSA-2024:2881
reference_id RHSA-2024:2881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2881
18
reference_url https://access.redhat.com/errata/RHSA-2024:2882
reference_id RHSA-2024:2882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2882
19
reference_url https://access.redhat.com/errata/RHSA-2024:2883
reference_id RHSA-2024:2883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2883
20
reference_url https://access.redhat.com/errata/RHSA-2024:2884
reference_id RHSA-2024:2884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2884
21
reference_url https://access.redhat.com/errata/RHSA-2024:2885
reference_id RHSA-2024:2885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2885
22
reference_url https://access.redhat.com/errata/RHSA-2024:2886
reference_id RHSA-2024:2886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2886
23
reference_url https://access.redhat.com/errata/RHSA-2024:2887
reference_id RHSA-2024:2887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2887
24
reference_url https://access.redhat.com/errata/RHSA-2024:2888
reference_id RHSA-2024:2888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2888
25
reference_url https://access.redhat.com/errata/RHSA-2024:2903
reference_id RHSA-2024:2903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2903
26
reference_url https://access.redhat.com/errata/RHSA-2024:2904
reference_id RHSA-2024:2904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2904
27
reference_url https://access.redhat.com/errata/RHSA-2024:2905
reference_id RHSA-2024:2905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2905
28
reference_url https://access.redhat.com/errata/RHSA-2024:2906
reference_id RHSA-2024:2906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2906
29
reference_url https://access.redhat.com/errata/RHSA-2024:2911
reference_id RHSA-2024:2911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2911
30
reference_url https://access.redhat.com/errata/RHSA-2024:2912
reference_id RHSA-2024:2912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2912
31
reference_url https://access.redhat.com/errata/RHSA-2024:2913
reference_id RHSA-2024:2913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2913
32
reference_url https://access.redhat.com/errata/RHSA-2024:3338
reference_id RHSA-2024:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3338
33
reference_url https://access.redhat.com/errata/RHSA-2024:3783
reference_id RHSA-2024:3783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3783
34
reference_url https://access.redhat.com/errata/RHSA-2024:3784
reference_id RHSA-2024:3784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3784
35
reference_url https://usn.ubuntu.com/6779-1/
reference_id USN-6779-1
reference_type
scores
url https://usn.ubuntu.com/6779-1/
36
reference_url https://usn.ubuntu.com/6782-1/
reference_id USN-6782-1
reference_type
scores
url https://usn.ubuntu.com/6782-1/
fixed_packages
0
url pkg:deb/debian/firefox@126.0-1?distro=sid
purl pkg:deb/debian/firefox@126.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@126.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2024-4777
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yb18-qe5e-dbck
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@126.0-1%3Fdistro=sid