Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/583843?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/583843?format=api", "purl": "pkg:deb/debian/firefox@122.0-1?distro=sid", "type": "deb", "namespace": "debian", "name": "firefox", "version": "122.0-1", "qualifiers": { "distro": "sid" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "123.0-1", "latest_non_vulnerable_version": "150.0-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44219?format=api", "vulnerability_id": "VCID-46cy-x3cp-tke5", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0743.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0743.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0743", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.76077", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.76074", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.76033", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.7599", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.76037", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.76023", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.75979", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.76011", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.76039", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.76062", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260012", "reference_id": "2260012", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260012" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-13", "reference_id": "mfsa2024-13", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-13" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-13/", "reference_id": "mfsa2024-13", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-13/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-14", "reference_id": "mfsa2024-14", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-14" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-14/", "reference_id": "mfsa2024-14", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-14/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00010.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html", "reference_id": "msg00022.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html", "reference_id": "msg00028.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1483", "reference_id": "RHSA-2024:1483", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1483" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1484", "reference_id": "RHSA-2024:1484", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1484" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1485", "reference_id": "RHSA-2024:1485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1485" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1486", "reference_id": "RHSA-2024:1486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1487", "reference_id": "RHSA-2024:1487", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1487" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1488", "reference_id": "RHSA-2024:1488", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1488" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1489", "reference_id": "RHSA-2024:1489", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1489" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1490", "reference_id": "RHSA-2024:1490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1491", "reference_id": "RHSA-2024:1491", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1491" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1492", "reference_id": "RHSA-2024:1492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1493", "reference_id": "RHSA-2024:1493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1494", "reference_id": "RHSA-2024:1494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1495", "reference_id": "RHSA-2024:1495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1496", "reference_id": "RHSA-2024:1496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1497", "reference_id": "RHSA-2024:1497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1498", "reference_id": "RHSA-2024:1498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1498" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1499", "reference_id": "RHSA-2024:1499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1500", "reference_id": "RHSA-2024:1500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1500" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1867408", "reference_id": "show_bug.cgi?id=1867408", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1867408" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" }, { "reference_url": "https://usn.ubuntu.com/6717-1/", "reference_id": "USN-6717-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6717-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583843?format=api", "purl": "pkg:deb/debian/firefox@122.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@122.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-0743" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-46cy-x3cp-tke5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44421?format=api", "vulnerability_id": "VCID-6na4-sgct-jugy", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0754.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0754.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0754", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40478", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40594", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40557", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40538", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40586", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40555", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40566", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40593", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40514", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40565", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40575", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0754" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260022", "reference_id": "2260022", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260022" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T15:34:02Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871605", "reference_id": "show_bug.cgi?id=1871605", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T15:34:02Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871605" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583843?format=api", "purl": "pkg:deb/debian/firefox@122.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@122.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-0754" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6na4-sgct-jugy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44362?format=api", "vulnerability_id": "VCID-7x5h-kej1-e3ef", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0751.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0751.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0751", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63335", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63352", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63317", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63354", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.6337", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63353", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63291", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63319", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63284", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63359", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00499", "scoring_system": "epss", "scoring_elements": "0.65942", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259932", "reference_id": "2259932", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259932" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-02/", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-04/", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-04/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html", "reference_id": "msg00022.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0559", "reference_id": "RHSA-2024:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0565", "reference_id": "RHSA-2024:0565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0596", "reference_id": "RHSA-2024:0596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0598", "reference_id": "RHSA-2024:0598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0600", "reference_id": "RHSA-2024:0600", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0600" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0601", "reference_id": "RHSA-2024:0601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0602", "reference_id": "RHSA-2024:0602", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0602" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0603", "reference_id": "RHSA-2024:0603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0603" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0604", "reference_id": "RHSA-2024:0604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0605", "reference_id": "RHSA-2024:0605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0608", "reference_id": "RHSA-2024:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0609", "reference_id": "RHSA-2024:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0615", "reference_id": "RHSA-2024:0615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0616", "reference_id": "RHSA-2024:0616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0618", "reference_id": "RHSA-2024:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0619", "reference_id": "RHSA-2024:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0622", "reference_id": "RHSA-2024:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0623", "reference_id": "RHSA-2024:0623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0623" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1865689", "reference_id": "show_bug.cgi?id=1865689", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1865689" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" }, { "reference_url": "https://usn.ubuntu.com/6669-1/", "reference_id": "USN-6669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6669-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583843?format=api", "purl": "pkg:deb/debian/firefox@122.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@122.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-0751" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7x5h-kej1-e3ef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44434?format=api", "vulnerability_id": "VCID-apes-5sa9-w7gd", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0755.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0755.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0755", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70728", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.73324", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.7328", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.73288", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.73308", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.73283", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.73269", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.73239", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.73333", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.73233", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.7326", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0755" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259934", "reference_id": "2259934", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259934" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701", "reference_id": "buglist.cgi?bug_id=1868456%2C1871445%2C1873701", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-02/", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-04/", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-04/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html", "reference_id": "msg00022.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0559", "reference_id": "RHSA-2024:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0565", "reference_id": "RHSA-2024:0565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0596", "reference_id": "RHSA-2024:0596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0598", "reference_id": "RHSA-2024:0598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0600", "reference_id": "RHSA-2024:0600", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0600" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0601", "reference_id": "RHSA-2024:0601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0602", "reference_id": "RHSA-2024:0602", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0602" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0603", "reference_id": "RHSA-2024:0603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0603" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0604", "reference_id": "RHSA-2024:0604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0605", "reference_id": "RHSA-2024:0605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0608", "reference_id": "RHSA-2024:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0609", "reference_id": "RHSA-2024:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0615", "reference_id": "RHSA-2024:0615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0616", "reference_id": "RHSA-2024:0616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0618", "reference_id": "RHSA-2024:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0619", "reference_id": "RHSA-2024:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0622", "reference_id": "RHSA-2024:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0623", "reference_id": "RHSA-2024:0623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0623" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" }, { "reference_url": "https://usn.ubuntu.com/6669-1/", "reference_id": "USN-6669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6669-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583843?format=api", "purl": "pkg:deb/debian/firefox@122.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@122.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-0755" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-apes-5sa9-w7gd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44306?format=api", "vulnerability_id": "VCID-gcyz-532w-bfcy", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0748.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0748.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0748", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43826", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43889", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43856", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43839", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43901", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43893", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43863", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43887", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43817", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43868", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43871", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0748" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260016", "reference_id": "2260016", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260016" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-11T15:14:05Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1783504", "reference_id": "show_bug.cgi?id=1783504", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-11T15:14:05Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1783504" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583843?format=api", "purl": "pkg:deb/debian/firefox@122.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@122.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-0748" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gcyz-532w-bfcy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44236?format=api", "vulnerability_id": "VCID-hvfz-fm5h-fugx", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0744.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0744.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0744", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.6592", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65917", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65951", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00885", "scoring_system": "epss", "scoring_elements": "0.75465", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00885", "scoring_system": "epss", "scoring_elements": "0.75461", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00885", "scoring_system": "epss", "scoring_elements": "0.7544", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00885", "scoring_system": "epss", "scoring_elements": "0.75429", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00885", "scoring_system": "epss", "scoring_elements": "0.7547", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00885", "scoring_system": "epss", "scoring_elements": "0.75476", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00885", "scoring_system": "epss", "scoring_elements": "0.75431", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00885", "scoring_system": "epss", "scoring_elements": "0.75441", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0744" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260014", "reference_id": "2260014", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260014" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-10T19:54:20Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871089", "reference_id": "show_bug.cgi?id=1871089", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-10T19:54:20Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871089" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583843?format=api", "purl": "pkg:deb/debian/firefox@122.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@122.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-0744" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hvfz-fm5h-fugx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44181?format=api", "vulnerability_id": "VCID-pvvt-h3mh-33eb", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0741.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0741.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0741", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.47284", "scoring_system": "epss", "scoring_elements": "0.97699", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.49052", "scoring_system": "epss", "scoring_elements": "0.97764", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.49052", "scoring_system": "epss", "scoring_elements": "0.97774", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.49052", "scoring_system": "epss", "scoring_elements": "0.97772", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.49052", "scoring_system": "epss", "scoring_elements": "0.9777", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.49052", "scoring_system": "epss", "scoring_elements": "0.97767", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.49052", "scoring_system": "epss", "scoring_elements": "0.97756", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.49052", "scoring_system": "epss", "scoring_elements": "0.97757", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.49052", "scoring_system": "epss", "scoring_elements": "0.97759", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.49052", "scoring_system": "epss", "scoring_elements": "0.97782", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.49052", "scoring_system": "epss", "scoring_elements": "0.9778", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259926", "reference_id": "2259926", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259926" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-02/", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-04/", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-04/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html", "reference_id": "msg00022.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0559", "reference_id": "RHSA-2024:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0565", "reference_id": "RHSA-2024:0565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0596", "reference_id": "RHSA-2024:0596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0598", "reference_id": "RHSA-2024:0598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0600", "reference_id": "RHSA-2024:0600", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0600" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0601", "reference_id": "RHSA-2024:0601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0602", "reference_id": "RHSA-2024:0602", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0602" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0603", "reference_id": "RHSA-2024:0603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0603" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0604", "reference_id": "RHSA-2024:0604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0605", "reference_id": "RHSA-2024:0605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0608", "reference_id": "RHSA-2024:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0609", "reference_id": "RHSA-2024:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0615", "reference_id": "RHSA-2024:0615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0616", "reference_id": "RHSA-2024:0616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0618", "reference_id": "RHSA-2024:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0619", "reference_id": "RHSA-2024:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0622", "reference_id": "RHSA-2024:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0623", "reference_id": "RHSA-2024:0623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0623" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1864587", "reference_id": "show_bug.cgi?id=1864587", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1864587" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" }, { "reference_url": "https://usn.ubuntu.com/6669-1/", "reference_id": "USN-6669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6669-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583843?format=api", "purl": "pkg:deb/debian/firefox@122.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@122.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-0741" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pvvt-h3mh-33eb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44270?format=api", "vulnerability_id": "VCID-t4rc-yuj8-n7au", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0746.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0746.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0746", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61411", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.635", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63464", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63507", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.6348", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63437", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63465", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63499", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63515", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63498", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259928", "reference_id": "2259928", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259928" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-02/", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-04/", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-04/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html", "reference_id": "msg00022.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0559", "reference_id": "RHSA-2024:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0565", "reference_id": "RHSA-2024:0565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0596", "reference_id": "RHSA-2024:0596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0598", "reference_id": "RHSA-2024:0598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0600", "reference_id": "RHSA-2024:0600", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0600" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0601", "reference_id": "RHSA-2024:0601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0602", "reference_id": "RHSA-2024:0602", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0602" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0603", "reference_id": "RHSA-2024:0603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0603" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0604", "reference_id": "RHSA-2024:0604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0605", "reference_id": "RHSA-2024:0605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0608", "reference_id": "RHSA-2024:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0609", "reference_id": "RHSA-2024:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0615", "reference_id": "RHSA-2024:0615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0616", "reference_id": "RHSA-2024:0616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0618", "reference_id": "RHSA-2024:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0619", "reference_id": "RHSA-2024:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0622", "reference_id": "RHSA-2024:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0623", "reference_id": "RHSA-2024:0623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0623" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1660223", "reference_id": "show_bug.cgi?id=1660223", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1660223" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" }, { "reference_url": "https://usn.ubuntu.com/6669-1/", "reference_id": "USN-6669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6669-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583843?format=api", "purl": "pkg:deb/debian/firefox@122.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@122.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-0746" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t4rc-yuj8-n7au" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44253?format=api", "vulnerability_id": "VCID-u8w1-rmga-kuan", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0745.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0745.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0745", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73291", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73275", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73255", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73247", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.7329", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73299", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73206", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73227", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.732", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73237", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.7325", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0745" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260009", "reference_id": "2260009", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260009" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-29T14:15:57Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871838", "reference_id": "show_bug.cgi?id=1871838", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-29T14:15:57Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871838" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583843?format=api", "purl": "pkg:deb/debian/firefox@122.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@122.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-0745" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u8w1-rmga-kuan" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44287?format=api", "vulnerability_id": "VCID-uh95-a456-7kbx", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0747.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0747.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0747", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.6358", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63537", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.6357", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63553", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63501", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.6351", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63572", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63571", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63586", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00462", "scoring_system": "epss", "scoring_elements": "0.64214", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259929", "reference_id": "2259929", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259929" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-02/", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-04/", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-04/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html", "reference_id": "msg00022.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0559", "reference_id": "RHSA-2024:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0565", "reference_id": "RHSA-2024:0565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0596", "reference_id": "RHSA-2024:0596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0598", "reference_id": "RHSA-2024:0598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0600", "reference_id": "RHSA-2024:0600", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0600" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0601", "reference_id": "RHSA-2024:0601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0602", "reference_id": "RHSA-2024:0602", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0602" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0603", "reference_id": "RHSA-2024:0603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0603" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0604", "reference_id": "RHSA-2024:0604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0605", "reference_id": "RHSA-2024:0605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0608", "reference_id": "RHSA-2024:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0609", "reference_id": "RHSA-2024:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0615", "reference_id": "RHSA-2024:0615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0616", "reference_id": "RHSA-2024:0616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0618", "reference_id": "RHSA-2024:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0619", "reference_id": "RHSA-2024:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0622", "reference_id": "RHSA-2024:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0623", "reference_id": "RHSA-2024:0623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0623" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1764343", "reference_id": "show_bug.cgi?id=1764343", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1764343" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" }, { "reference_url": "https://usn.ubuntu.com/6669-1/", "reference_id": "USN-6669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6669-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583843?format=api", "purl": "pkg:deb/debian/firefox@122.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@122.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-0747" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uh95-a456-7kbx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44323?format=api", "vulnerability_id": "VCID-vwkf-9gfp-d3cy", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0749.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0749.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0749", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.5569", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55712", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55672", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55644", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55669", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55646", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55698", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55701", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.5571", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55715", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56593", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259930", "reference_id": "2259930", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259930" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-29T19:41:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-04/", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-29T19:41:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-04/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-29T19:41:27Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html", "reference_id": "msg00022.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-29T19:41:27Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0559", "reference_id": "RHSA-2024:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0565", "reference_id": "RHSA-2024:0565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0596", "reference_id": "RHSA-2024:0596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0598", "reference_id": "RHSA-2024:0598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0600", "reference_id": "RHSA-2024:0600", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0600" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0601", "reference_id": "RHSA-2024:0601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0602", "reference_id": "RHSA-2024:0602", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0602" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0603", "reference_id": "RHSA-2024:0603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0603" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0604", "reference_id": "RHSA-2024:0604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0605", "reference_id": "RHSA-2024:0605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0608", "reference_id": "RHSA-2024:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0609", "reference_id": "RHSA-2024:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0615", "reference_id": "RHSA-2024:0615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0616", "reference_id": "RHSA-2024:0616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0618", "reference_id": "RHSA-2024:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0619", "reference_id": "RHSA-2024:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0622", "reference_id": "RHSA-2024:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0623", "reference_id": "RHSA-2024:0623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0623" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1813463", "reference_id": "show_bug.cgi?id=1813463", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-29T19:41:27Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1813463" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" }, { "reference_url": "https://usn.ubuntu.com/6669-1/", "reference_id": "USN-6669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6669-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583843?format=api", "purl": "pkg:deb/debian/firefox@122.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@122.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-0749" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vwkf-9gfp-d3cy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44199?format=api", "vulnerability_id": "VCID-xan8-8fq6-yfgd", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0742.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0742.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0742", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01786", "scoring_system": "epss", "scoring_elements": "0.82773", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01786", "scoring_system": "epss", "scoring_elements": "0.82698", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01786", "scoring_system": "epss", "scoring_elements": "0.82727", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01786", "scoring_system": "epss", "scoring_elements": "0.8272", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01786", "scoring_system": "epss", "scoring_elements": "0.82694", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01786", "scoring_system": "epss", "scoring_elements": "0.82684", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01786", "scoring_system": "epss", "scoring_elements": "0.82735", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01786", "scoring_system": "epss", "scoring_elements": "0.82738", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01786", "scoring_system": "epss", "scoring_elements": "0.82744", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01842", "scoring_system": "epss", "scoring_elements": "0.83001", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259927", "reference_id": "2259927", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259927" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-02/", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-04/", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-04/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html", "reference_id": "msg00022.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0559", "reference_id": "RHSA-2024:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0565", "reference_id": "RHSA-2024:0565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0596", "reference_id": "RHSA-2024:0596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0598", "reference_id": "RHSA-2024:0598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0600", "reference_id": "RHSA-2024:0600", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0600" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0601", "reference_id": "RHSA-2024:0601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0602", "reference_id": "RHSA-2024:0602", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0602" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0603", "reference_id": "RHSA-2024:0603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0603" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0604", "reference_id": "RHSA-2024:0604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0605", "reference_id": "RHSA-2024:0605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0608", "reference_id": "RHSA-2024:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0609", "reference_id": "RHSA-2024:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0615", "reference_id": "RHSA-2024:0615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0616", "reference_id": "RHSA-2024:0616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0618", "reference_id": "RHSA-2024:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0619", "reference_id": "RHSA-2024:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0622", "reference_id": "RHSA-2024:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0623", "reference_id": "RHSA-2024:0623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0623" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1867152", "reference_id": "show_bug.cgi?id=1867152", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1867152" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" }, { "reference_url": "https://usn.ubuntu.com/6669-1/", "reference_id": "USN-6669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6669-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583843?format=api", "purl": "pkg:deb/debian/firefox@122.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@122.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-0742" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xan8-8fq6-yfgd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44342?format=api", "vulnerability_id": "VCID-xg25-xm9t-cfb8", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0750.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0750.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0750", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01479", "scoring_system": "epss", "scoring_elements": "0.81022", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01479", "scoring_system": "epss", "scoring_elements": "0.80957", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01479", "scoring_system": "epss", "scoring_elements": "0.80989", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01479", "scoring_system": "epss", "scoring_elements": "0.80982", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01479", "scoring_system": "epss", "scoring_elements": "0.80955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01479", "scoring_system": "epss", "scoring_elements": "0.80935", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01479", "scoring_system": "epss", "scoring_elements": "0.81021", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01479", "scoring_system": "epss", "scoring_elements": "0.80984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01479", "scoring_system": "epss", "scoring_elements": "0.80992", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01479", "scoring_system": "epss", "scoring_elements": "0.81006", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81318", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259931", "reference_id": "2259931", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259931" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-02/", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-04/", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-04/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html", "reference_id": "msg00022.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0559", "reference_id": "RHSA-2024:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0565", "reference_id": "RHSA-2024:0565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0596", "reference_id": "RHSA-2024:0596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0598", "reference_id": "RHSA-2024:0598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0600", "reference_id": "RHSA-2024:0600", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0600" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0601", "reference_id": "RHSA-2024:0601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0602", "reference_id": "RHSA-2024:0602", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0602" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0603", "reference_id": "RHSA-2024:0603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0603" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0604", "reference_id": "RHSA-2024:0604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0605", "reference_id": "RHSA-2024:0605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0608", "reference_id": "RHSA-2024:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0609", "reference_id": "RHSA-2024:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0615", "reference_id": "RHSA-2024:0615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0616", "reference_id": "RHSA-2024:0616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0618", "reference_id": "RHSA-2024:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0619", "reference_id": "RHSA-2024:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0622", "reference_id": "RHSA-2024:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0623", "reference_id": "RHSA-2024:0623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0623" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1863083", "reference_id": "show_bug.cgi?id=1863083", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1863083" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" }, { "reference_url": "https://usn.ubuntu.com/6669-1/", "reference_id": "USN-6669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6669-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583843?format=api", "purl": "pkg:deb/debian/firefox@122.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@122.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-0750" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xg25-xm9t-cfb8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44403?format=api", "vulnerability_id": "VCID-y8xv-ss2c-4bhk", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0753.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0753.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0753", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55659", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.5784", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57815", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57837", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57858", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57842", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57791", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57811", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57785", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57843", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57844", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259933", "reference_id": "2259933", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259933" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-02/", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-04/", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-04/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html", "reference_id": "msg00022.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0559", "reference_id": "RHSA-2024:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0565", "reference_id": "RHSA-2024:0565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0596", "reference_id": "RHSA-2024:0596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0598", "reference_id": "RHSA-2024:0598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0600", "reference_id": "RHSA-2024:0600", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0600" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0601", "reference_id": "RHSA-2024:0601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0602", "reference_id": "RHSA-2024:0602", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0602" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0603", "reference_id": "RHSA-2024:0603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0603" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0604", "reference_id": "RHSA-2024:0604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0605", "reference_id": "RHSA-2024:0605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0608", "reference_id": "RHSA-2024:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0609", "reference_id": "RHSA-2024:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0615", "reference_id": "RHSA-2024:0615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0616", "reference_id": "RHSA-2024:0616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0618", "reference_id": "RHSA-2024:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0619", "reference_id": "RHSA-2024:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0622", "reference_id": "RHSA-2024:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0623", "reference_id": "RHSA-2024:0623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0623" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1870262", "reference_id": "show_bug.cgi?id=1870262", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1870262" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" }, { "reference_url": "https://usn.ubuntu.com/6669-1/", "reference_id": "USN-6669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6669-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583843?format=api", "purl": "pkg:deb/debian/firefox@122.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@122.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-0753" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y8xv-ss2c-4bhk" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@122.0-1%3Fdistro=sid" }