Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/firefox@146.0-1?distro=sid
Typedeb
Namespacedebian
Namefirefox
Version146.0-1
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version146.0.1-1
Latest_non_vulnerable_version150.0-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1jqj-tqfp-73f7
vulnerability_id VCID-1jqj-tqfp-73f7
summary JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 146, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14325.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14325.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14325
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25286
published_at 2026-04-07T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.25477
published_at 2026-04-02T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.25398
published_at 2026-04-09T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25353
published_at 2026-04-08T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25514
published_at 2026-04-04T12:55:00Z
5
value 0.00115
scoring_system epss
scoring_elements 0.30263
published_at 2026-04-11T12:55:00Z
6
value 0.00115
scoring_system epss
scoring_elements 0.30125
published_at 2026-04-21T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30168
published_at 2026-04-18T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30187
published_at 2026-04-16T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.30173
published_at 2026-04-13T12:55:00Z
10
value 0.00115
scoring_system epss
scoring_elements 0.3022
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14325
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14325
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420504
reference_id 2420504
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420504
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T17:04:03Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
reference_id mfsa2025-94
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-94/
reference_id mfsa2025-94
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T17:04:03Z/
url https://www.mozilla.org/security/advisories/mfsa2025-94/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T17:04:03Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
reference_id mfsa2025-96
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-96/
reference_id mfsa2025-96
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T17:04:03Z/
url https://www.mozilla.org/security/advisories/mfsa2025-96/
13
reference_url https://access.redhat.com/errata/RHSA-2025:23034
reference_id RHSA-2025:23034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23034
14
reference_url https://access.redhat.com/errata/RHSA-2025:23035
reference_id RHSA-2025:23035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23035
15
reference_url https://access.redhat.com/errata/RHSA-2025:23128
reference_id RHSA-2025:23128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23128
16
reference_url https://access.redhat.com/errata/RHSA-2025:23856
reference_id RHSA-2025:23856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23856
17
reference_url https://access.redhat.com/errata/RHSA-2026:0003
reference_id RHSA-2026:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0003
18
reference_url https://access.redhat.com/errata/RHSA-2026:0004
reference_id RHSA-2026:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0004
19
reference_url https://access.redhat.com/errata/RHSA-2026:0005
reference_id RHSA-2026:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0005
20
reference_url https://access.redhat.com/errata/RHSA-2026:0006
reference_id RHSA-2026:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0006
21
reference_url https://access.redhat.com/errata/RHSA-2026:0007
reference_id RHSA-2026:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0007
22
reference_url https://access.redhat.com/errata/RHSA-2026:0013
reference_id RHSA-2026:0013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0013
23
reference_url https://access.redhat.com/errata/RHSA-2026:0014
reference_id RHSA-2026:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0014
24
reference_url https://access.redhat.com/errata/RHSA-2026:0015
reference_id RHSA-2026:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0015
25
reference_url https://access.redhat.com/errata/RHSA-2026:0016
reference_id RHSA-2026:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0016
26
reference_url https://access.redhat.com/errata/RHSA-2026:0017
reference_id RHSA-2026:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0017
27
reference_url https://access.redhat.com/errata/RHSA-2026:0018
reference_id RHSA-2026:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0018
28
reference_url https://access.redhat.com/errata/RHSA-2026:0019
reference_id RHSA-2026:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0019
29
reference_url https://access.redhat.com/errata/RHSA-2026:0020
reference_id RHSA-2026:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0020
30
reference_url https://access.redhat.com/errata/RHSA-2026:0021
reference_id RHSA-2026:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0021
31
reference_url https://access.redhat.com/errata/RHSA-2026:0022
reference_id RHSA-2026:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0022
32
reference_url https://access.redhat.com/errata/RHSA-2026:0023
reference_id RHSA-2026:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0023
33
reference_url https://access.redhat.com/errata/RHSA-2026:0024
reference_id RHSA-2026:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0024
34
reference_url https://access.redhat.com/errata/RHSA-2026:0025
reference_id RHSA-2026:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0025
35
reference_url https://access.redhat.com/errata/RHSA-2026:0026
reference_id RHSA-2026:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0026
36
reference_url https://access.redhat.com/errata/RHSA-2026:0124
reference_id RHSA-2026:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0124
37
reference_url https://access.redhat.com/errata/RHSA-2026:0127
reference_id RHSA-2026:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0127
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1998050
reference_id show_bug.cgi?id=1998050
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T17:04:03Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1998050
39
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox@146.0-1?distro=sid
purl pkg:deb/debian/firefox@146.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@146.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2025-14325
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1jqj-tqfp-73f7
1
url VCID-4g7u-xmdq-mkdn
vulnerability_id VCID-4g7u-xmdq-mkdn
summary Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 146, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14328.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14328.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14328
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16329
published_at 2026-04-07T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.1647
published_at 2026-04-02T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16473
published_at 2026-04-09T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16415
published_at 2026-04-08T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16532
published_at 2026-04-04T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22459
published_at 2026-04-16T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22404
published_at 2026-04-21T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22456
published_at 2026-04-18T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22498
published_at 2026-04-12T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22443
published_at 2026-04-13T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22539
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14328
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14328
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14328
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420508
reference_id 2420508
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420508
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
reference_id mfsa2025-94
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-94/
reference_id mfsa2025-94
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-94/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
reference_id mfsa2025-96
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-96/
reference_id mfsa2025-96
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-96/
13
reference_url https://access.redhat.com/errata/RHSA-2025:23034
reference_id RHSA-2025:23034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23034
14
reference_url https://access.redhat.com/errata/RHSA-2025:23035
reference_id RHSA-2025:23035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23035
15
reference_url https://access.redhat.com/errata/RHSA-2025:23128
reference_id RHSA-2025:23128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23128
16
reference_url https://access.redhat.com/errata/RHSA-2025:23856
reference_id RHSA-2025:23856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23856
17
reference_url https://access.redhat.com/errata/RHSA-2026:0003
reference_id RHSA-2026:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0003
18
reference_url https://access.redhat.com/errata/RHSA-2026:0004
reference_id RHSA-2026:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0004
19
reference_url https://access.redhat.com/errata/RHSA-2026:0005
reference_id RHSA-2026:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0005
20
reference_url https://access.redhat.com/errata/RHSA-2026:0006
reference_id RHSA-2026:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0006
21
reference_url https://access.redhat.com/errata/RHSA-2026:0007
reference_id RHSA-2026:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0007
22
reference_url https://access.redhat.com/errata/RHSA-2026:0013
reference_id RHSA-2026:0013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0013
23
reference_url https://access.redhat.com/errata/RHSA-2026:0014
reference_id RHSA-2026:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0014
24
reference_url https://access.redhat.com/errata/RHSA-2026:0015
reference_id RHSA-2026:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0015
25
reference_url https://access.redhat.com/errata/RHSA-2026:0016
reference_id RHSA-2026:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0016
26
reference_url https://access.redhat.com/errata/RHSA-2026:0017
reference_id RHSA-2026:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0017
27
reference_url https://access.redhat.com/errata/RHSA-2026:0018
reference_id RHSA-2026:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0018
28
reference_url https://access.redhat.com/errata/RHSA-2026:0019
reference_id RHSA-2026:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0019
29
reference_url https://access.redhat.com/errata/RHSA-2026:0020
reference_id RHSA-2026:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0020
30
reference_url https://access.redhat.com/errata/RHSA-2026:0021
reference_id RHSA-2026:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0021
31
reference_url https://access.redhat.com/errata/RHSA-2026:0022
reference_id RHSA-2026:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0022
32
reference_url https://access.redhat.com/errata/RHSA-2026:0023
reference_id RHSA-2026:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0023
33
reference_url https://access.redhat.com/errata/RHSA-2026:0024
reference_id RHSA-2026:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0024
34
reference_url https://access.redhat.com/errata/RHSA-2026:0025
reference_id RHSA-2026:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0025
35
reference_url https://access.redhat.com/errata/RHSA-2026:0026
reference_id RHSA-2026:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0026
36
reference_url https://access.redhat.com/errata/RHSA-2026:0124
reference_id RHSA-2026:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0124
37
reference_url https://access.redhat.com/errata/RHSA-2026:0127
reference_id RHSA-2026:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0127
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1996761
reference_id show_bug.cgi?id=1996761
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:17Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1996761
39
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox@146.0-1?distro=sid
purl pkg:deb/debian/firefox@146.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@146.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2025-14328
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4g7u-xmdq-mkdn
2
url VCID-5kwn-x8e4-ukgq
vulnerability_id VCID-5kwn-x8e4-ukgq
summary Memory safety bugs present in Firefox ESR 140.5, Thunderbird ESR 140.5, Firefox 145 and Thunderbird 145. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14333.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14333.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14333
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20569
published_at 2026-04-07T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20797
published_at 2026-04-02T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20707
published_at 2026-04-09T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20646
published_at 2026-04-08T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20855
published_at 2026-04-04T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24922
published_at 2026-04-11T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.2481
published_at 2026-04-21T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24832
published_at 2026-04-18T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24839
published_at 2026-04-16T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.24828
published_at 2026-04-13T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24883
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14333
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14333
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420502
reference_id 2420502
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420502
5
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1966501%2C1997639
reference_id buglist.cgi?bug_id=1966501%2C1997639
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:13Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1966501%2C1997639
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
7
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:13Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
reference_id mfsa2025-94
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
9
reference_url https://www.mozilla.org/security/advisories/mfsa2025-94/
reference_id mfsa2025-94
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:13Z/
url https://www.mozilla.org/security/advisories/mfsa2025-94/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
11
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:13Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
reference_id mfsa2025-96
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
13
reference_url https://www.mozilla.org/security/advisories/mfsa2025-96/
reference_id mfsa2025-96
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:13Z/
url https://www.mozilla.org/security/advisories/mfsa2025-96/
14
reference_url https://access.redhat.com/errata/RHSA-2025:23034
reference_id RHSA-2025:23034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23034
15
reference_url https://access.redhat.com/errata/RHSA-2025:23035
reference_id RHSA-2025:23035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23035
16
reference_url https://access.redhat.com/errata/RHSA-2025:23128
reference_id RHSA-2025:23128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23128
17
reference_url https://access.redhat.com/errata/RHSA-2025:23856
reference_id RHSA-2025:23856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23856
18
reference_url https://access.redhat.com/errata/RHSA-2026:0003
reference_id RHSA-2026:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0003
19
reference_url https://access.redhat.com/errata/RHSA-2026:0004
reference_id RHSA-2026:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0004
20
reference_url https://access.redhat.com/errata/RHSA-2026:0005
reference_id RHSA-2026:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0005
21
reference_url https://access.redhat.com/errata/RHSA-2026:0006
reference_id RHSA-2026:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0006
22
reference_url https://access.redhat.com/errata/RHSA-2026:0007
reference_id RHSA-2026:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0007
23
reference_url https://access.redhat.com/errata/RHSA-2026:0013
reference_id RHSA-2026:0013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0013
24
reference_url https://access.redhat.com/errata/RHSA-2026:0014
reference_id RHSA-2026:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0014
25
reference_url https://access.redhat.com/errata/RHSA-2026:0015
reference_id RHSA-2026:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0015
26
reference_url https://access.redhat.com/errata/RHSA-2026:0016
reference_id RHSA-2026:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0016
27
reference_url https://access.redhat.com/errata/RHSA-2026:0017
reference_id RHSA-2026:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0017
28
reference_url https://access.redhat.com/errata/RHSA-2026:0018
reference_id RHSA-2026:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0018
29
reference_url https://access.redhat.com/errata/RHSA-2026:0019
reference_id RHSA-2026:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0019
30
reference_url https://access.redhat.com/errata/RHSA-2026:0020
reference_id RHSA-2026:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0020
31
reference_url https://access.redhat.com/errata/RHSA-2026:0021
reference_id RHSA-2026:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0021
32
reference_url https://access.redhat.com/errata/RHSA-2026:0022
reference_id RHSA-2026:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0022
33
reference_url https://access.redhat.com/errata/RHSA-2026:0023
reference_id RHSA-2026:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0023
34
reference_url https://access.redhat.com/errata/RHSA-2026:0024
reference_id RHSA-2026:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0024
35
reference_url https://access.redhat.com/errata/RHSA-2026:0025
reference_id RHSA-2026:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0025
36
reference_url https://access.redhat.com/errata/RHSA-2026:0026
reference_id RHSA-2026:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0026
37
reference_url https://access.redhat.com/errata/RHSA-2026:0124
reference_id RHSA-2026:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0124
38
reference_url https://access.redhat.com/errata/RHSA-2026:0127
reference_id RHSA-2026:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0127
fixed_packages
0
url pkg:deb/debian/firefox@146.0-1?distro=sid
purl pkg:deb/debian/firefox@146.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@146.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2025-14333
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5kwn-x8e4-ukgq
3
url VCID-84jf-84jx-3fgj
vulnerability_id VCID-84jf-84jx-3fgj
summary Privilege escalation in the DOM: Notifications component. This vulnerability affects Firefox < 146, Firefox ESR < 115.31, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14323.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14323.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14323
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16898
published_at 2026-04-04T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16841
published_at 2026-04-02T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16821
published_at 2026-04-09T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16767
published_at 2026-04-08T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16682
published_at 2026-04-07T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22712
published_at 2026-04-13T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22807
published_at 2026-04-11T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22728
published_at 2026-04-16T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22769
published_at 2026-04-12T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22683
published_at 2026-04-21T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22724
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14323
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14323
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420513
reference_id 2420513
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420513
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:12Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-93
reference_id mfsa2025-93
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-93
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-93/
reference_id mfsa2025-93
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:12Z/
url https://www.mozilla.org/security/advisories/mfsa2025-93/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
reference_id mfsa2025-94
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-94/
reference_id mfsa2025-94
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:12Z/
url https://www.mozilla.org/security/advisories/mfsa2025-94/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:12Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
reference_id mfsa2025-96
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
14
reference_url https://www.mozilla.org/security/advisories/mfsa2025-96/
reference_id mfsa2025-96
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:12Z/
url https://www.mozilla.org/security/advisories/mfsa2025-96/
15
reference_url https://access.redhat.com/errata/RHSA-2025:23034
reference_id RHSA-2025:23034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23034
16
reference_url https://access.redhat.com/errata/RHSA-2025:23035
reference_id RHSA-2025:23035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23035
17
reference_url https://access.redhat.com/errata/RHSA-2025:23128
reference_id RHSA-2025:23128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23128
18
reference_url https://access.redhat.com/errata/RHSA-2025:23856
reference_id RHSA-2025:23856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23856
19
reference_url https://access.redhat.com/errata/RHSA-2026:0003
reference_id RHSA-2026:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0003
20
reference_url https://access.redhat.com/errata/RHSA-2026:0004
reference_id RHSA-2026:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0004
21
reference_url https://access.redhat.com/errata/RHSA-2026:0005
reference_id RHSA-2026:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0005
22
reference_url https://access.redhat.com/errata/RHSA-2026:0006
reference_id RHSA-2026:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0006
23
reference_url https://access.redhat.com/errata/RHSA-2026:0007
reference_id RHSA-2026:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0007
24
reference_url https://access.redhat.com/errata/RHSA-2026:0013
reference_id RHSA-2026:0013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0013
25
reference_url https://access.redhat.com/errata/RHSA-2026:0014
reference_id RHSA-2026:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0014
26
reference_url https://access.redhat.com/errata/RHSA-2026:0015
reference_id RHSA-2026:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0015
27
reference_url https://access.redhat.com/errata/RHSA-2026:0016
reference_id RHSA-2026:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0016
28
reference_url https://access.redhat.com/errata/RHSA-2026:0017
reference_id RHSA-2026:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0017
29
reference_url https://access.redhat.com/errata/RHSA-2026:0018
reference_id RHSA-2026:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0018
30
reference_url https://access.redhat.com/errata/RHSA-2026:0019
reference_id RHSA-2026:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0019
31
reference_url https://access.redhat.com/errata/RHSA-2026:0020
reference_id RHSA-2026:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0020
32
reference_url https://access.redhat.com/errata/RHSA-2026:0021
reference_id RHSA-2026:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0021
33
reference_url https://access.redhat.com/errata/RHSA-2026:0022
reference_id RHSA-2026:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0022
34
reference_url https://access.redhat.com/errata/RHSA-2026:0023
reference_id RHSA-2026:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0023
35
reference_url https://access.redhat.com/errata/RHSA-2026:0024
reference_id RHSA-2026:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0024
36
reference_url https://access.redhat.com/errata/RHSA-2026:0025
reference_id RHSA-2026:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0025
37
reference_url https://access.redhat.com/errata/RHSA-2026:0026
reference_id RHSA-2026:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0026
38
reference_url https://access.redhat.com/errata/RHSA-2026:0124
reference_id RHSA-2026:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0124
39
reference_url https://access.redhat.com/errata/RHSA-2026:0127
reference_id RHSA-2026:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0127
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1996555
reference_id show_bug.cgi?id=1996555
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:12Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1996555
41
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox@146.0-1?distro=sid
purl pkg:deb/debian/firefox@146.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@146.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2025-14323
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-84jf-84jx-3fgj
4
url VCID-db28-rbyf-1qf4
vulnerability_id VCID-db28-rbyf-1qf4
summary Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 146, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14329.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14329.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14329
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16329
published_at 2026-04-07T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.1647
published_at 2026-04-02T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16473
published_at 2026-04-09T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16415
published_at 2026-04-08T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16532
published_at 2026-04-04T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22459
published_at 2026-04-16T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22404
published_at 2026-04-21T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22456
published_at 2026-04-18T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22498
published_at 2026-04-12T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22443
published_at 2026-04-13T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22539
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14329
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14329
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420509
reference_id 2420509
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420509
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:15Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
reference_id mfsa2025-94
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-94/
reference_id mfsa2025-94
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:15Z/
url https://www.mozilla.org/security/advisories/mfsa2025-94/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:15Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
reference_id mfsa2025-96
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-96/
reference_id mfsa2025-96
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:15Z/
url https://www.mozilla.org/security/advisories/mfsa2025-96/
13
reference_url https://access.redhat.com/errata/RHSA-2025:23034
reference_id RHSA-2025:23034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23034
14
reference_url https://access.redhat.com/errata/RHSA-2025:23035
reference_id RHSA-2025:23035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23035
15
reference_url https://access.redhat.com/errata/RHSA-2025:23128
reference_id RHSA-2025:23128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23128
16
reference_url https://access.redhat.com/errata/RHSA-2025:23856
reference_id RHSA-2025:23856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23856
17
reference_url https://access.redhat.com/errata/RHSA-2026:0003
reference_id RHSA-2026:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0003
18
reference_url https://access.redhat.com/errata/RHSA-2026:0004
reference_id RHSA-2026:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0004
19
reference_url https://access.redhat.com/errata/RHSA-2026:0005
reference_id RHSA-2026:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0005
20
reference_url https://access.redhat.com/errata/RHSA-2026:0006
reference_id RHSA-2026:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0006
21
reference_url https://access.redhat.com/errata/RHSA-2026:0007
reference_id RHSA-2026:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0007
22
reference_url https://access.redhat.com/errata/RHSA-2026:0013
reference_id RHSA-2026:0013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0013
23
reference_url https://access.redhat.com/errata/RHSA-2026:0014
reference_id RHSA-2026:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0014
24
reference_url https://access.redhat.com/errata/RHSA-2026:0015
reference_id RHSA-2026:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0015
25
reference_url https://access.redhat.com/errata/RHSA-2026:0016
reference_id RHSA-2026:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0016
26
reference_url https://access.redhat.com/errata/RHSA-2026:0017
reference_id RHSA-2026:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0017
27
reference_url https://access.redhat.com/errata/RHSA-2026:0018
reference_id RHSA-2026:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0018
28
reference_url https://access.redhat.com/errata/RHSA-2026:0019
reference_id RHSA-2026:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0019
29
reference_url https://access.redhat.com/errata/RHSA-2026:0020
reference_id RHSA-2026:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0020
30
reference_url https://access.redhat.com/errata/RHSA-2026:0021
reference_id RHSA-2026:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0021
31
reference_url https://access.redhat.com/errata/RHSA-2026:0022
reference_id RHSA-2026:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0022
32
reference_url https://access.redhat.com/errata/RHSA-2026:0023
reference_id RHSA-2026:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0023
33
reference_url https://access.redhat.com/errata/RHSA-2026:0024
reference_id RHSA-2026:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0024
34
reference_url https://access.redhat.com/errata/RHSA-2026:0025
reference_id RHSA-2026:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0025
35
reference_url https://access.redhat.com/errata/RHSA-2026:0026
reference_id RHSA-2026:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0026
36
reference_url https://access.redhat.com/errata/RHSA-2026:0124
reference_id RHSA-2026:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0124
37
reference_url https://access.redhat.com/errata/RHSA-2026:0127
reference_id RHSA-2026:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0127
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1997018
reference_id show_bug.cgi?id=1997018
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:15Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1997018
39
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox@146.0-1?distro=sid
purl pkg:deb/debian/firefox@146.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@146.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2025-14329
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-db28-rbyf-1qf4
5
url VCID-epbu-sqny-23ez
vulnerability_id VCID-epbu-sqny-23ez
summary Use-after-free in the Audio/Video: GMP component. This vulnerability affects Firefox < 146 and Thunderbird < 146.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14326.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14326.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14326
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18534
published_at 2026-04-07T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18817
published_at 2026-04-04T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18614
published_at 2026-04-08T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18763
published_at 2026-04-02T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18669
published_at 2026-04-09T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.22976
published_at 2026-04-12T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.22892
published_at 2026-04-21T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.22929
published_at 2026-04-18T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.22935
published_at 2026-04-16T12:55:00Z
9
value 0.00077
scoring_system epss
scoring_elements 0.22921
published_at 2026-04-13T12:55:00Z
10
value 0.00077
scoring_system epss
scoring_elements 0.23013
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14326
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420514
reference_id 2420514
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420514
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
5
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:47:02Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
7
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:47:02Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1840666
reference_id show_bug.cgi?id=1840666
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:47:02Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1840666
fixed_packages
0
url pkg:deb/debian/firefox@146.0-1?distro=sid
purl pkg:deb/debian/firefox@146.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@146.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2025-14326
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-epbu-sqny-23ez
6
url VCID-h9em-p9se-rucn
vulnerability_id VCID-h9em-p9se-rucn
summary Use-after-free in the WebRTC: Signaling component. This vulnerability affects Firefox < 146, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14321.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14321.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14321
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20569
published_at 2026-04-07T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20797
published_at 2026-04-02T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20707
published_at 2026-04-09T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20646
published_at 2026-04-08T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20855
published_at 2026-04-04T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24922
published_at 2026-04-11T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.2481
published_at 2026-04-21T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24832
published_at 2026-04-18T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24839
published_at 2026-04-16T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.24828
published_at 2026-04-13T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24883
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14321
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14321
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420503
reference_id 2420503
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420503
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T19:36:51Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
reference_id mfsa2025-94
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-94/
reference_id mfsa2025-94
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T19:36:51Z/
url https://www.mozilla.org/security/advisories/mfsa2025-94/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T19:36:51Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
reference_id mfsa2025-96
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-96/
reference_id mfsa2025-96
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T19:36:51Z/
url https://www.mozilla.org/security/advisories/mfsa2025-96/
13
reference_url https://access.redhat.com/errata/RHSA-2025:23034
reference_id RHSA-2025:23034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23034
14
reference_url https://access.redhat.com/errata/RHSA-2025:23035
reference_id RHSA-2025:23035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23035
15
reference_url https://access.redhat.com/errata/RHSA-2025:23128
reference_id RHSA-2025:23128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23128
16
reference_url https://access.redhat.com/errata/RHSA-2025:23856
reference_id RHSA-2025:23856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23856
17
reference_url https://access.redhat.com/errata/RHSA-2026:0003
reference_id RHSA-2026:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0003
18
reference_url https://access.redhat.com/errata/RHSA-2026:0004
reference_id RHSA-2026:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0004
19
reference_url https://access.redhat.com/errata/RHSA-2026:0005
reference_id RHSA-2026:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0005
20
reference_url https://access.redhat.com/errata/RHSA-2026:0006
reference_id RHSA-2026:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0006
21
reference_url https://access.redhat.com/errata/RHSA-2026:0007
reference_id RHSA-2026:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0007
22
reference_url https://access.redhat.com/errata/RHSA-2026:0013
reference_id RHSA-2026:0013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0013
23
reference_url https://access.redhat.com/errata/RHSA-2026:0014
reference_id RHSA-2026:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0014
24
reference_url https://access.redhat.com/errata/RHSA-2026:0015
reference_id RHSA-2026:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0015
25
reference_url https://access.redhat.com/errata/RHSA-2026:0016
reference_id RHSA-2026:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0016
26
reference_url https://access.redhat.com/errata/RHSA-2026:0017
reference_id RHSA-2026:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0017
27
reference_url https://access.redhat.com/errata/RHSA-2026:0018
reference_id RHSA-2026:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0018
28
reference_url https://access.redhat.com/errata/RHSA-2026:0019
reference_id RHSA-2026:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0019
29
reference_url https://access.redhat.com/errata/RHSA-2026:0020
reference_id RHSA-2026:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0020
30
reference_url https://access.redhat.com/errata/RHSA-2026:0021
reference_id RHSA-2026:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0021
31
reference_url https://access.redhat.com/errata/RHSA-2026:0022
reference_id RHSA-2026:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0022
32
reference_url https://access.redhat.com/errata/RHSA-2026:0023
reference_id RHSA-2026:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0023
33
reference_url https://access.redhat.com/errata/RHSA-2026:0024
reference_id RHSA-2026:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0024
34
reference_url https://access.redhat.com/errata/RHSA-2026:0025
reference_id RHSA-2026:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0025
35
reference_url https://access.redhat.com/errata/RHSA-2026:0026
reference_id RHSA-2026:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0026
36
reference_url https://access.redhat.com/errata/RHSA-2026:0124
reference_id RHSA-2026:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0124
37
reference_url https://access.redhat.com/errata/RHSA-2026:0127
reference_id RHSA-2026:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0127
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1992760
reference_id show_bug.cgi?id=1992760
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T19:36:51Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1992760
39
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox@146.0-1?distro=sid
purl pkg:deb/debian/firefox@146.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@146.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2025-14321
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h9em-p9se-rucn
7
url VCID-hccf-ueut-vugw
vulnerability_id VCID-hccf-ueut-vugw
summary Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. This vulnerability affects Firefox < 146, Firefox ESR < 115.31, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14322.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14322.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14322
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.146
published_at 2026-04-04T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.1453
published_at 2026-04-02T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.1455
published_at 2026-04-09T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14495
published_at 2026-04-08T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.1441
published_at 2026-04-07T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19517
published_at 2026-04-13T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19623
published_at 2026-04-11T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19482
published_at 2026-04-16T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19575
published_at 2026-04-12T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19502
published_at 2026-04-21T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19491
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14322
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14322
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420506
reference_id 2420506
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420506
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:18Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-93
reference_id mfsa2025-93
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-93
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-93/
reference_id mfsa2025-93
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:18Z/
url https://www.mozilla.org/security/advisories/mfsa2025-93/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
reference_id mfsa2025-94
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-94/
reference_id mfsa2025-94
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:18Z/
url https://www.mozilla.org/security/advisories/mfsa2025-94/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:18Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
reference_id mfsa2025-96
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
14
reference_url https://www.mozilla.org/security/advisories/mfsa2025-96/
reference_id mfsa2025-96
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:18Z/
url https://www.mozilla.org/security/advisories/mfsa2025-96/
15
reference_url https://access.redhat.com/errata/RHSA-2025:23034
reference_id RHSA-2025:23034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23034
16
reference_url https://access.redhat.com/errata/RHSA-2025:23035
reference_id RHSA-2025:23035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23035
17
reference_url https://access.redhat.com/errata/RHSA-2025:23128
reference_id RHSA-2025:23128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23128
18
reference_url https://access.redhat.com/errata/RHSA-2025:23856
reference_id RHSA-2025:23856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23856
19
reference_url https://access.redhat.com/errata/RHSA-2026:0003
reference_id RHSA-2026:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0003
20
reference_url https://access.redhat.com/errata/RHSA-2026:0004
reference_id RHSA-2026:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0004
21
reference_url https://access.redhat.com/errata/RHSA-2026:0005
reference_id RHSA-2026:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0005
22
reference_url https://access.redhat.com/errata/RHSA-2026:0006
reference_id RHSA-2026:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0006
23
reference_url https://access.redhat.com/errata/RHSA-2026:0007
reference_id RHSA-2026:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0007
24
reference_url https://access.redhat.com/errata/RHSA-2026:0013
reference_id RHSA-2026:0013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0013
25
reference_url https://access.redhat.com/errata/RHSA-2026:0014
reference_id RHSA-2026:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0014
26
reference_url https://access.redhat.com/errata/RHSA-2026:0015
reference_id RHSA-2026:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0015
27
reference_url https://access.redhat.com/errata/RHSA-2026:0016
reference_id RHSA-2026:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0016
28
reference_url https://access.redhat.com/errata/RHSA-2026:0017
reference_id RHSA-2026:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0017
29
reference_url https://access.redhat.com/errata/RHSA-2026:0018
reference_id RHSA-2026:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0018
30
reference_url https://access.redhat.com/errata/RHSA-2026:0019
reference_id RHSA-2026:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0019
31
reference_url https://access.redhat.com/errata/RHSA-2026:0020
reference_id RHSA-2026:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0020
32
reference_url https://access.redhat.com/errata/RHSA-2026:0021
reference_id RHSA-2026:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0021
33
reference_url https://access.redhat.com/errata/RHSA-2026:0022
reference_id RHSA-2026:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0022
34
reference_url https://access.redhat.com/errata/RHSA-2026:0023
reference_id RHSA-2026:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0023
35
reference_url https://access.redhat.com/errata/RHSA-2026:0024
reference_id RHSA-2026:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0024
36
reference_url https://access.redhat.com/errata/RHSA-2026:0025
reference_id RHSA-2026:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0025
37
reference_url https://access.redhat.com/errata/RHSA-2026:0026
reference_id RHSA-2026:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0026
38
reference_url https://access.redhat.com/errata/RHSA-2026:0124
reference_id RHSA-2026:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0124
39
reference_url https://access.redhat.com/errata/RHSA-2026:0127
reference_id RHSA-2026:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0127
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1996473
reference_id show_bug.cgi?id=1996473
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-10T04:57:18Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1996473
41
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox@146.0-1?distro=sid
purl pkg:deb/debian/firefox@146.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@146.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2025-14322
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hccf-ueut-vugw
8
url VCID-k3wz-tvrb-p3fg
vulnerability_id VCID-k3wz-tvrb-p3fg
summary Memory safety bugs present in Firefox 145 and Thunderbird 145. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14332.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14332.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14332
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.17137
published_at 2026-04-04T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.17062
published_at 2026-04-09T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.17003
published_at 2026-04-08T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.17083
published_at 2026-04-02T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.16914
published_at 2026-04-07T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21484
published_at 2026-04-11T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21359
published_at 2026-04-21T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21391
published_at 2026-04-18T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21384
published_at 2026-04-16T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21389
published_at 2026-04-13T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21445
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14332
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420510
reference_id 2420510
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420510
4
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1963153%2C1985058%2C1995637%2C1997118
reference_id buglist.cgi?bug_id=1963153%2C1985058%2C1995637%2C1997118
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T16:56:12Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1963153%2C1985058%2C1995637%2C1997118
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T16:56:12Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T16:56:12Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
fixed_packages
0
url pkg:deb/debian/firefox@146.0-1?distro=sid
purl pkg:deb/debian/firefox@146.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@146.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2025-14332
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k3wz-tvrb-p3fg
9
url VCID-kk2m-2mxz-sbex
vulnerability_id VCID-kk2m-2mxz-sbex
summary Spoofing issue in the Downloads Panel component. This vulnerability affects Firefox < 146, Thunderbird < 146, Firefox ESR < 140.7, and Thunderbird < 140.7.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14327.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14327.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14327
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02672
published_at 2026-04-04T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02659
published_at 2026-04-02T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02702
published_at 2026-04-09T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02682
published_at 2026-04-08T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.0268
published_at 2026-04-07T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03467
published_at 2026-04-11T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03403
published_at 2026-04-18T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03391
published_at 2026-04-16T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03415
published_at 2026-04-13T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03439
published_at 2026-04-12T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03521
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14327
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14327
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14327
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420507
reference_id 2420507
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420507
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T20:42:08Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T20:42:08Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
reference_id mfsa2026-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-03
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-03/
reference_id mfsa2026-03
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T20:42:08Z/
url https://www.mozilla.org/security/advisories/mfsa2026-03/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
reference_id mfsa2026-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-05
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-05/
reference_id mfsa2026-05
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T20:42:08Z/
url https://www.mozilla.org/security/advisories/mfsa2026-05/
13
reference_url https://access.redhat.com/errata/RHSA-2026:0667
reference_id RHSA-2026:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0667
14
reference_url https://access.redhat.com/errata/RHSA-2026:0694
reference_id RHSA-2026:0694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0694
15
reference_url https://access.redhat.com/errata/RHSA-2026:0924
reference_id RHSA-2026:0924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0924
16
reference_url https://access.redhat.com/errata/RHSA-2026:1320
reference_id RHSA-2026:1320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1320
17
reference_url https://access.redhat.com/errata/RHSA-2026:1413
reference_id RHSA-2026:1413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1413
18
reference_url https://access.redhat.com/errata/RHSA-2026:1414
reference_id RHSA-2026:1414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1414
19
reference_url https://access.redhat.com/errata/RHSA-2026:1415
reference_id RHSA-2026:1415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1415
20
reference_url https://access.redhat.com/errata/RHSA-2026:1461
reference_id RHSA-2026:1461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1461
21
reference_url https://access.redhat.com/errata/RHSA-2026:1462
reference_id RHSA-2026:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1462
22
reference_url https://access.redhat.com/errata/RHSA-2026:1471
reference_id RHSA-2026:1471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1471
23
reference_url https://access.redhat.com/errata/RHSA-2026:1487
reference_id RHSA-2026:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1487
24
reference_url https://access.redhat.com/errata/RHSA-2026:2041
reference_id RHSA-2026:2041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2041
25
reference_url https://access.redhat.com/errata/RHSA-2026:2043
reference_id RHSA-2026:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2043
26
reference_url https://access.redhat.com/errata/RHSA-2026:2044
reference_id RHSA-2026:2044
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2044
27
reference_url https://access.redhat.com/errata/RHSA-2026:2047
reference_id RHSA-2026:2047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2047
28
reference_url https://access.redhat.com/errata/RHSA-2026:2069
reference_id RHSA-2026:2069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2069
29
reference_url https://access.redhat.com/errata/RHSA-2026:2070
reference_id RHSA-2026:2070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2070
30
reference_url https://access.redhat.com/errata/RHSA-2026:2073
reference_id RHSA-2026:2073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2073
31
reference_url https://access.redhat.com/errata/RHSA-2026:2074
reference_id RHSA-2026:2074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2074
32
reference_url https://access.redhat.com/errata/RHSA-2026:2220
reference_id RHSA-2026:2220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2220
33
reference_url https://access.redhat.com/errata/RHSA-2026:2231
reference_id RHSA-2026:2231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2231
34
reference_url https://access.redhat.com/errata/RHSA-2026:2271
reference_id RHSA-2026:2271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2271
35
reference_url https://access.redhat.com/errata/RHSA-2026:2286
reference_id RHSA-2026:2286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2286
36
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1970743
reference_id show_bug.cgi?id=1970743
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T20:42:08Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1970743
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox@146.0-1?distro=sid
purl pkg:deb/debian/firefox@146.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@146.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2025-14327
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kk2m-2mxz-sbex
10
url VCID-pcgf-xtfq-6ugb
vulnerability_id VCID-pcgf-xtfq-6ugb
summary JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 146, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14330.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14330.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14330
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21238
published_at 2026-04-07T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.21432
published_at 2026-04-02T12:55:00Z
2
value 0.00069
scoring_system epss
scoring_elements 0.2138
published_at 2026-04-09T12:55:00Z
3
value 0.00069
scoring_system epss
scoring_elements 0.21318
published_at 2026-04-08T12:55:00Z
4
value 0.00069
scoring_system epss
scoring_elements 0.21486
published_at 2026-04-04T12:55:00Z
5
value 0.0009
scoring_system epss
scoring_elements 0.2542
published_at 2026-04-16T12:55:00Z
6
value 0.0009
scoring_system epss
scoring_elements 0.25377
published_at 2026-04-21T12:55:00Z
7
value 0.0009
scoring_system epss
scoring_elements 0.25409
published_at 2026-04-18T12:55:00Z
8
value 0.0009
scoring_system epss
scoring_elements 0.25471
published_at 2026-04-12T12:55:00Z
9
value 0.0009
scoring_system epss
scoring_elements 0.25414
published_at 2026-04-13T12:55:00Z
10
value 0.0009
scoring_system epss
scoring_elements 0.25514
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14330
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14330
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420516
reference_id 2420516
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420516
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:35:46Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
reference_id mfsa2025-94
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-94/
reference_id mfsa2025-94
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:35:46Z/
url https://www.mozilla.org/security/advisories/mfsa2025-94/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:35:46Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
reference_id mfsa2025-96
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-96/
reference_id mfsa2025-96
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:35:46Z/
url https://www.mozilla.org/security/advisories/mfsa2025-96/
13
reference_url https://access.redhat.com/errata/RHSA-2025:23034
reference_id RHSA-2025:23034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23034
14
reference_url https://access.redhat.com/errata/RHSA-2025:23035
reference_id RHSA-2025:23035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23035
15
reference_url https://access.redhat.com/errata/RHSA-2025:23128
reference_id RHSA-2025:23128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23128
16
reference_url https://access.redhat.com/errata/RHSA-2025:23856
reference_id RHSA-2025:23856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23856
17
reference_url https://access.redhat.com/errata/RHSA-2026:0003
reference_id RHSA-2026:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0003
18
reference_url https://access.redhat.com/errata/RHSA-2026:0004
reference_id RHSA-2026:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0004
19
reference_url https://access.redhat.com/errata/RHSA-2026:0005
reference_id RHSA-2026:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0005
20
reference_url https://access.redhat.com/errata/RHSA-2026:0006
reference_id RHSA-2026:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0006
21
reference_url https://access.redhat.com/errata/RHSA-2026:0007
reference_id RHSA-2026:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0007
22
reference_url https://access.redhat.com/errata/RHSA-2026:0013
reference_id RHSA-2026:0013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0013
23
reference_url https://access.redhat.com/errata/RHSA-2026:0014
reference_id RHSA-2026:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0014
24
reference_url https://access.redhat.com/errata/RHSA-2026:0015
reference_id RHSA-2026:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0015
25
reference_url https://access.redhat.com/errata/RHSA-2026:0016
reference_id RHSA-2026:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0016
26
reference_url https://access.redhat.com/errata/RHSA-2026:0017
reference_id RHSA-2026:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0017
27
reference_url https://access.redhat.com/errata/RHSA-2026:0018
reference_id RHSA-2026:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0018
28
reference_url https://access.redhat.com/errata/RHSA-2026:0019
reference_id RHSA-2026:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0019
29
reference_url https://access.redhat.com/errata/RHSA-2026:0020
reference_id RHSA-2026:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0020
30
reference_url https://access.redhat.com/errata/RHSA-2026:0021
reference_id RHSA-2026:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0021
31
reference_url https://access.redhat.com/errata/RHSA-2026:0022
reference_id RHSA-2026:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0022
32
reference_url https://access.redhat.com/errata/RHSA-2026:0023
reference_id RHSA-2026:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0023
33
reference_url https://access.redhat.com/errata/RHSA-2026:0024
reference_id RHSA-2026:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0024
34
reference_url https://access.redhat.com/errata/RHSA-2026:0025
reference_id RHSA-2026:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0025
35
reference_url https://access.redhat.com/errata/RHSA-2026:0026
reference_id RHSA-2026:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0026
36
reference_url https://access.redhat.com/errata/RHSA-2026:0124
reference_id RHSA-2026:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0124
37
reference_url https://access.redhat.com/errata/RHSA-2026:0127
reference_id RHSA-2026:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0127
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1997503
reference_id show_bug.cgi?id=1997503
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:35:46Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1997503
39
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox@146.0-1?distro=sid
purl pkg:deb/debian/firefox@146.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@146.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2025-14330
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pcgf-xtfq-6ugb
11
url VCID-tkzd-c11q-3qaf
vulnerability_id VCID-tkzd-c11q-3qaf
summary Same-origin policy bypass in the Request Handling component. This vulnerability affects Firefox < 146, Firefox ESR < 115.31, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14331.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14331.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14331
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.10997
published_at 2026-04-04T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.10932
published_at 2026-04-02T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.1095
published_at 2026-04-09T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.10897
published_at 2026-04-08T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.10822
published_at 2026-04-07T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13633
published_at 2026-04-13T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13718
published_at 2026-04-11T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13545
published_at 2026-04-16T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13682
published_at 2026-04-12T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13616
published_at 2026-04-21T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13543
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14331
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14331
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14331
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420512
reference_id 2420512
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420512
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T16:59:10Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-93
reference_id mfsa2025-93
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-93
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-93/
reference_id mfsa2025-93
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T16:59:10Z/
url https://www.mozilla.org/security/advisories/mfsa2025-93/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
reference_id mfsa2025-94
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-94/
reference_id mfsa2025-94
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T16:59:10Z/
url https://www.mozilla.org/security/advisories/mfsa2025-94/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T16:59:10Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
reference_id mfsa2025-96
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
14
reference_url https://www.mozilla.org/security/advisories/mfsa2025-96/
reference_id mfsa2025-96
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T16:59:10Z/
url https://www.mozilla.org/security/advisories/mfsa2025-96/
15
reference_url https://access.redhat.com/errata/RHSA-2025:23034
reference_id RHSA-2025:23034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23034
16
reference_url https://access.redhat.com/errata/RHSA-2025:23035
reference_id RHSA-2025:23035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23035
17
reference_url https://access.redhat.com/errata/RHSA-2025:23128
reference_id RHSA-2025:23128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23128
18
reference_url https://access.redhat.com/errata/RHSA-2025:23856
reference_id RHSA-2025:23856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23856
19
reference_url https://access.redhat.com/errata/RHSA-2026:0003
reference_id RHSA-2026:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0003
20
reference_url https://access.redhat.com/errata/RHSA-2026:0004
reference_id RHSA-2026:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0004
21
reference_url https://access.redhat.com/errata/RHSA-2026:0005
reference_id RHSA-2026:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0005
22
reference_url https://access.redhat.com/errata/RHSA-2026:0006
reference_id RHSA-2026:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0006
23
reference_url https://access.redhat.com/errata/RHSA-2026:0007
reference_id RHSA-2026:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0007
24
reference_url https://access.redhat.com/errata/RHSA-2026:0013
reference_id RHSA-2026:0013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0013
25
reference_url https://access.redhat.com/errata/RHSA-2026:0014
reference_id RHSA-2026:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0014
26
reference_url https://access.redhat.com/errata/RHSA-2026:0015
reference_id RHSA-2026:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0015
27
reference_url https://access.redhat.com/errata/RHSA-2026:0016
reference_id RHSA-2026:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0016
28
reference_url https://access.redhat.com/errata/RHSA-2026:0017
reference_id RHSA-2026:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0017
29
reference_url https://access.redhat.com/errata/RHSA-2026:0018
reference_id RHSA-2026:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0018
30
reference_url https://access.redhat.com/errata/RHSA-2026:0019
reference_id RHSA-2026:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0019
31
reference_url https://access.redhat.com/errata/RHSA-2026:0020
reference_id RHSA-2026:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0020
32
reference_url https://access.redhat.com/errata/RHSA-2026:0021
reference_id RHSA-2026:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0021
33
reference_url https://access.redhat.com/errata/RHSA-2026:0022
reference_id RHSA-2026:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0022
34
reference_url https://access.redhat.com/errata/RHSA-2026:0023
reference_id RHSA-2026:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0023
35
reference_url https://access.redhat.com/errata/RHSA-2026:0024
reference_id RHSA-2026:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0024
36
reference_url https://access.redhat.com/errata/RHSA-2026:0025
reference_id RHSA-2026:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0025
37
reference_url https://access.redhat.com/errata/RHSA-2026:0026
reference_id RHSA-2026:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0026
38
reference_url https://access.redhat.com/errata/RHSA-2026:0124
reference_id RHSA-2026:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0124
39
reference_url https://access.redhat.com/errata/RHSA-2026:0127
reference_id RHSA-2026:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0127
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2000218
reference_id show_bug.cgi?id=2000218
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-09T16:59:10Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2000218
41
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox@146.0-1?distro=sid
purl pkg:deb/debian/firefox@146.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@146.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2025-14331
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tkzd-c11q-3qaf
12
url VCID-xghm-4ygw-tkb2
vulnerability_id VCID-xghm-4ygw-tkb2
summary JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 146, Firefox ESR < 115.31, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14324.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14324.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14324
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.2266
published_at 2026-04-04T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22617
published_at 2026-04-02T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22585
published_at 2026-04-09T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22531
published_at 2026-04-08T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22449
published_at 2026-04-07T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26673
published_at 2026-04-12T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26717
published_at 2026-04-11T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26557
published_at 2026-04-21T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.26595
published_at 2026-04-18T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.26624
published_at 2026-04-16T12:55:00Z
10
value 0.00096
scoring_system epss
scoring_elements 0.26616
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14324
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14324
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420517
reference_id 2420517
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420517
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
reference_id mfsa2025-92
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-92
6
reference_url https://www.mozilla.org/security/advisories/mfsa2025-92/
reference_id mfsa2025-92
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:01:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-92/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-93
reference_id mfsa2025-93
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-93
8
reference_url https://www.mozilla.org/security/advisories/mfsa2025-93/
reference_id mfsa2025-93
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:01:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-93/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
reference_id mfsa2025-94
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-94
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-94/
reference_id mfsa2025-94
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:01:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-94/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
reference_id mfsa2025-95
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-95
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-95/
reference_id mfsa2025-95
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:01:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-95/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
reference_id mfsa2025-96
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-96
14
reference_url https://www.mozilla.org/security/advisories/mfsa2025-96/
reference_id mfsa2025-96
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:01:17Z/
url https://www.mozilla.org/security/advisories/mfsa2025-96/
15
reference_url https://access.redhat.com/errata/RHSA-2025:23034
reference_id RHSA-2025:23034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23034
16
reference_url https://access.redhat.com/errata/RHSA-2025:23035
reference_id RHSA-2025:23035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23035
17
reference_url https://access.redhat.com/errata/RHSA-2025:23128
reference_id RHSA-2025:23128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23128
18
reference_url https://access.redhat.com/errata/RHSA-2025:23856
reference_id RHSA-2025:23856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23856
19
reference_url https://access.redhat.com/errata/RHSA-2026:0003
reference_id RHSA-2026:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0003
20
reference_url https://access.redhat.com/errata/RHSA-2026:0004
reference_id RHSA-2026:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0004
21
reference_url https://access.redhat.com/errata/RHSA-2026:0005
reference_id RHSA-2026:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0005
22
reference_url https://access.redhat.com/errata/RHSA-2026:0006
reference_id RHSA-2026:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0006
23
reference_url https://access.redhat.com/errata/RHSA-2026:0007
reference_id RHSA-2026:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0007
24
reference_url https://access.redhat.com/errata/RHSA-2026:0013
reference_id RHSA-2026:0013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0013
25
reference_url https://access.redhat.com/errata/RHSA-2026:0014
reference_id RHSA-2026:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0014
26
reference_url https://access.redhat.com/errata/RHSA-2026:0015
reference_id RHSA-2026:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0015
27
reference_url https://access.redhat.com/errata/RHSA-2026:0016
reference_id RHSA-2026:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0016
28
reference_url https://access.redhat.com/errata/RHSA-2026:0017
reference_id RHSA-2026:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0017
29
reference_url https://access.redhat.com/errata/RHSA-2026:0018
reference_id RHSA-2026:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0018
30
reference_url https://access.redhat.com/errata/RHSA-2026:0019
reference_id RHSA-2026:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0019
31
reference_url https://access.redhat.com/errata/RHSA-2026:0020
reference_id RHSA-2026:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0020
32
reference_url https://access.redhat.com/errata/RHSA-2026:0021
reference_id RHSA-2026:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0021
33
reference_url https://access.redhat.com/errata/RHSA-2026:0022
reference_id RHSA-2026:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0022
34
reference_url https://access.redhat.com/errata/RHSA-2026:0023
reference_id RHSA-2026:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0023
35
reference_url https://access.redhat.com/errata/RHSA-2026:0024
reference_id RHSA-2026:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0024
36
reference_url https://access.redhat.com/errata/RHSA-2026:0025
reference_id RHSA-2026:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0025
37
reference_url https://access.redhat.com/errata/RHSA-2026:0026
reference_id RHSA-2026:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0026
38
reference_url https://access.redhat.com/errata/RHSA-2026:0124
reference_id RHSA-2026:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0124
39
reference_url https://access.redhat.com/errata/RHSA-2026:0127
reference_id RHSA-2026:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0127
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1996840
reference_id show_bug.cgi?id=1996840
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-11T20:01:17Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1996840
41
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:deb/debian/firefox@146.0-1?distro=sid
purl pkg:deb/debian/firefox@146.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@146.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
aliases CVE-2025-14324
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xghm-4ygw-tkb2
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@146.0-1%3Fdistro=sid