Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/firefox@124.0-1?distro=sid
Typedeb
Namespacedebian
Namefirefox
Version124.0-1
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version124.0.1-1
Latest_non_vulnerable_version149.0.2-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2tts-gwgd-zqcz
vulnerability_id VCID-2tts-gwgd-zqcz
summary A vulnerability has been discovered in NSS, which can lead to the recovery of private data.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5388.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5388.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5388
reference_id
reference_type
scores
0
value 0.0018
scoring_system epss
scoring_elements 0.39713
published_at 2026-04-04T12:55:00Z
1
value 0.0018
scoring_system epss
scoring_elements 0.39691
published_at 2026-04-02T12:55:00Z
2
value 0.00245
scoring_system epss
scoring_elements 0.47729
published_at 2026-04-12T12:55:00Z
3
value 0.00245
scoring_system epss
scoring_elements 0.47787
published_at 2026-04-18T12:55:00Z
4
value 0.00245
scoring_system epss
scoring_elements 0.47794
published_at 2026-04-16T12:55:00Z
5
value 0.00245
scoring_system epss
scoring_elements 0.47739
published_at 2026-04-13T12:55:00Z
6
value 0.00245
scoring_system epss
scoring_elements 0.47752
published_at 2026-04-11T12:55:00Z
7
value 0.00245
scoring_system epss
scoring_elements 0.47727
published_at 2026-04-09T12:55:00Z
8
value 0.00245
scoring_system epss
scoring_elements 0.47732
published_at 2026-04-08T12:55:00Z
9
value 0.00245
scoring_system epss
scoring_elements 0.47677
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5388
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056284
reference_id 1056284
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056284
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2243644
reference_id 2243644
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2243644
15
reference_url https://security.gentoo.org/glsa/202508-04
reference_id GLSA-202508-04
reference_type
scores
url https://security.gentoo.org/glsa/202508-04
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
reference_id mfsa2024-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-12/
reference_id mfsa2024-12
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/
url https://www.mozilla.org/security/advisories/mfsa2024-12/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
reference_id mfsa2024-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-13/
reference_id mfsa2024-13
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/
url https://www.mozilla.org/security/advisories/mfsa2024-13/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
reference_id mfsa2024-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-14/
reference_id mfsa2024-14
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/
url https://www.mozilla.org/security/advisories/mfsa2024-14/
22
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
23
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
24
reference_url https://access.redhat.com/errata/RHSA-2024:0093
reference_id RHSA-2024:0093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0093
25
reference_url https://access.redhat.com/errata/RHSA-2024:0105
reference_id RHSA-2024:0105
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0105
26
reference_url https://access.redhat.com/errata/RHSA-2024:0106
reference_id RHSA-2024:0106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0106
27
reference_url https://access.redhat.com/errata/RHSA-2024:0107
reference_id RHSA-2024:0107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0107
28
reference_url https://access.redhat.com/errata/RHSA-2024:0108
reference_id RHSA-2024:0108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0108
29
reference_url https://access.redhat.com/errata/RHSA-2024:1483
reference_id RHSA-2024:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1483
30
reference_url https://access.redhat.com/errata/RHSA-2024:1484
reference_id RHSA-2024:1484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1484
31
reference_url https://access.redhat.com/errata/RHSA-2024:1485
reference_id RHSA-2024:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1485
32
reference_url https://access.redhat.com/errata/RHSA-2024:1486
reference_id RHSA-2024:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1486
33
reference_url https://access.redhat.com/errata/RHSA-2024:1487
reference_id RHSA-2024:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1487
34
reference_url https://access.redhat.com/errata/RHSA-2024:1488
reference_id RHSA-2024:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1488
35
reference_url https://access.redhat.com/errata/RHSA-2024:1489
reference_id RHSA-2024:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1489
36
reference_url https://access.redhat.com/errata/RHSA-2024:1490
reference_id RHSA-2024:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1490
37
reference_url https://access.redhat.com/errata/RHSA-2024:1491
reference_id RHSA-2024:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1491
38
reference_url https://access.redhat.com/errata/RHSA-2024:1492
reference_id RHSA-2024:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1492
39
reference_url https://access.redhat.com/errata/RHSA-2024:1493
reference_id RHSA-2024:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1493
40
reference_url https://access.redhat.com/errata/RHSA-2024:1494
reference_id RHSA-2024:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1494
41
reference_url https://access.redhat.com/errata/RHSA-2024:1495
reference_id RHSA-2024:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1495
42
reference_url https://access.redhat.com/errata/RHSA-2024:1496
reference_id RHSA-2024:1496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1496
43
reference_url https://access.redhat.com/errata/RHSA-2024:1497
reference_id RHSA-2024:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1497
44
reference_url https://access.redhat.com/errata/RHSA-2024:1498
reference_id RHSA-2024:1498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1498
45
reference_url https://access.redhat.com/errata/RHSA-2024:1499
reference_id RHSA-2024:1499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1499
46
reference_url https://access.redhat.com/errata/RHSA-2024:1500
reference_id RHSA-2024:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1500
47
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1780432
reference_id show_bug.cgi?id=1780432
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1780432
48
reference_url https://usn.ubuntu.com/6703-1/
reference_id USN-6703-1
reference_type
scores
url https://usn.ubuntu.com/6703-1/
49
reference_url https://usn.ubuntu.com/6717-1/
reference_id USN-6717-1
reference_type
scores
url https://usn.ubuntu.com/6717-1/
50
reference_url https://usn.ubuntu.com/6727-1/
reference_id USN-6727-1
reference_type
scores
url https://usn.ubuntu.com/6727-1/
fixed_packages
0
url pkg:deb/debian/firefox@124.0-1?distro=sid
purl pkg:deb/debian/firefox@124.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2023-5388
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2tts-gwgd-zqcz
1
url VCID-2zdh-azdw-tuav
vulnerability_id VCID-2zdh-azdw-tuav
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2609.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2609.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2609
reference_id
reference_type
scores
0
value 0.01113
scoring_system epss
scoring_elements 0.78133
published_at 2026-04-07T12:55:00Z
1
value 0.01113
scoring_system epss
scoring_elements 0.78201
published_at 2026-04-18T12:55:00Z
2
value 0.01113
scoring_system epss
scoring_elements 0.78203
published_at 2026-04-16T12:55:00Z
3
value 0.01113
scoring_system epss
scoring_elements 0.7817
published_at 2026-04-13T12:55:00Z
4
value 0.01113
scoring_system epss
scoring_elements 0.78174
published_at 2026-04-12T12:55:00Z
5
value 0.01113
scoring_system epss
scoring_elements 0.78191
published_at 2026-04-11T12:55:00Z
6
value 0.01113
scoring_system epss
scoring_elements 0.78166
published_at 2026-04-09T12:55:00Z
7
value 0.01113
scoring_system epss
scoring_elements 0.78121
published_at 2026-04-02T12:55:00Z
8
value 0.01113
scoring_system epss
scoring_elements 0.78151
published_at 2026-04-04T12:55:00Z
9
value 0.01113
scoring_system epss
scoring_elements 0.78159
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2609
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275551
reference_id 2275551
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275551
12
reference_url https://security.gentoo.org/glsa/202405-32
reference_id GLSA-202405-32
reference_type
scores
url https://security.gentoo.org/glsa/202405-32
13
reference_url https://security.gentoo.org/glsa/202407-19
reference_id GLSA-202407-19
reference_type
scores
url https://security.gentoo.org/glsa/202407-19
14
reference_url https://security.gentoo.org/glsa/202408-02
reference_id GLSA-202408-02
reference_type
scores
url https://security.gentoo.org/glsa/202408-02
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
reference_id mfsa2024-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-12/
reference_id mfsa2024-12
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T15:04:02Z/
url https://www.mozilla.org/security/advisories/mfsa2024-12/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-19
reference_id mfsa2024-19
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-19
18
reference_url https://www.mozilla.org/security/advisories/mfsa2024-19/
reference_id mfsa2024-19
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T15:04:02Z/
url https://www.mozilla.org/security/advisories/mfsa2024-19/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-20
reference_id mfsa2024-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-20
20
reference_url https://www.mozilla.org/security/advisories/mfsa2024-20/
reference_id mfsa2024-20
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T15:04:02Z/
url https://www.mozilla.org/security/advisories/mfsa2024-20/
21
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html
reference_id msg00012.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T15:04:02Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html
22
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html
reference_id msg00013.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T15:04:02Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html
23
reference_url https://access.redhat.com/errata/RHSA-2024:1904
reference_id RHSA-2024:1904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1904
24
reference_url https://access.redhat.com/errata/RHSA-2024:1905
reference_id RHSA-2024:1905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1905
25
reference_url https://access.redhat.com/errata/RHSA-2024:1906
reference_id RHSA-2024:1906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1906
26
reference_url https://access.redhat.com/errata/RHSA-2024:1907
reference_id RHSA-2024:1907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1907
27
reference_url https://access.redhat.com/errata/RHSA-2024:1908
reference_id RHSA-2024:1908
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1908
28
reference_url https://access.redhat.com/errata/RHSA-2024:1909
reference_id RHSA-2024:1909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1909
29
reference_url https://access.redhat.com/errata/RHSA-2024:1910
reference_id RHSA-2024:1910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1910
30
reference_url https://access.redhat.com/errata/RHSA-2024:1911
reference_id RHSA-2024:1911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1911
31
reference_url https://access.redhat.com/errata/RHSA-2024:1912
reference_id RHSA-2024:1912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1912
32
reference_url https://access.redhat.com/errata/RHSA-2024:1934
reference_id RHSA-2024:1934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1934
33
reference_url https://access.redhat.com/errata/RHSA-2024:1935
reference_id RHSA-2024:1935
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1935
34
reference_url https://access.redhat.com/errata/RHSA-2024:1936
reference_id RHSA-2024:1936
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1936
35
reference_url https://access.redhat.com/errata/RHSA-2024:1937
reference_id RHSA-2024:1937
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1937
36
reference_url https://access.redhat.com/errata/RHSA-2024:1938
reference_id RHSA-2024:1938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1938
37
reference_url https://access.redhat.com/errata/RHSA-2024:1939
reference_id RHSA-2024:1939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1939
38
reference_url https://access.redhat.com/errata/RHSA-2024:1940
reference_id RHSA-2024:1940
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1940
39
reference_url https://access.redhat.com/errata/RHSA-2024:1941
reference_id RHSA-2024:1941
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1941
40
reference_url https://access.redhat.com/errata/RHSA-2024:1982
reference_id RHSA-2024:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1982
41
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1866100
reference_id show_bug.cgi?id=1866100
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T15:04:02Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1866100
42
reference_url https://usn.ubuntu.com/6703-1/
reference_id USN-6703-1
reference_type
scores
url https://usn.ubuntu.com/6703-1/
43
reference_url https://usn.ubuntu.com/6750-1/
reference_id USN-6750-1
reference_type
scores
url https://usn.ubuntu.com/6750-1/
fixed_packages
0
url pkg:deb/debian/firefox@124.0-1?distro=sid
purl pkg:deb/debian/firefox@124.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2024-2609
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2zdh-azdw-tuav
2
url VCID-3vbp-2h4f-7bav
vulnerability_id VCID-3vbp-2h4f-7bav
summary A missing delay on when pointer lock was used could have allowed a malicious page to trick a user into granting permissions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2611.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2611.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2611
reference_id
reference_type
scores
0
value 0.00238
scoring_system epss
scoring_elements 0.46877
published_at 2026-04-02T12:55:00Z
1
value 0.00238
scoring_system epss
scoring_elements 0.46894
published_at 2026-04-04T12:55:00Z
2
value 0.00323
scoring_system epss
scoring_elements 0.55362
published_at 2026-04-13T12:55:00Z
3
value 0.00323
scoring_system epss
scoring_elements 0.5538
published_at 2026-04-12T12:55:00Z
4
value 0.00323
scoring_system epss
scoring_elements 0.55401
published_at 2026-04-18T12:55:00Z
5
value 0.00323
scoring_system epss
scoring_elements 0.55397
published_at 2026-04-16T12:55:00Z
6
value 0.00323
scoring_system epss
scoring_elements 0.55402
published_at 2026-04-11T12:55:00Z
7
value 0.00323
scoring_system epss
scoring_elements 0.55391
published_at 2026-04-09T12:55:00Z
8
value 0.00323
scoring_system epss
scoring_elements 0.55392
published_at 2026-04-08T12:55:00Z
9
value 0.00323
scoring_system epss
scoring_elements 0.55341
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2611
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270664
reference_id 2270664
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270664
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
reference_id mfsa2024-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-12/
reference_id mfsa2024-12
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/
url https://www.mozilla.org/security/advisories/mfsa2024-12/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
reference_id mfsa2024-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-13/
reference_id mfsa2024-13
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/
url https://www.mozilla.org/security/advisories/mfsa2024-13/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
reference_id mfsa2024-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-14/
reference_id mfsa2024-14
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/
url https://www.mozilla.org/security/advisories/mfsa2024-14/
20
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
21
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
22
reference_url https://access.redhat.com/errata/RHSA-2024:1483
reference_id RHSA-2024:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1483
23
reference_url https://access.redhat.com/errata/RHSA-2024:1484
reference_id RHSA-2024:1484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1484
24
reference_url https://access.redhat.com/errata/RHSA-2024:1485
reference_id RHSA-2024:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1485
25
reference_url https://access.redhat.com/errata/RHSA-2024:1486
reference_id RHSA-2024:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1486
26
reference_url https://access.redhat.com/errata/RHSA-2024:1487
reference_id RHSA-2024:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1487
27
reference_url https://access.redhat.com/errata/RHSA-2024:1488
reference_id RHSA-2024:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1488
28
reference_url https://access.redhat.com/errata/RHSA-2024:1489
reference_id RHSA-2024:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1489
29
reference_url https://access.redhat.com/errata/RHSA-2024:1490
reference_id RHSA-2024:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1490
30
reference_url https://access.redhat.com/errata/RHSA-2024:1491
reference_id RHSA-2024:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1491
31
reference_url https://access.redhat.com/errata/RHSA-2024:1492
reference_id RHSA-2024:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1492
32
reference_url https://access.redhat.com/errata/RHSA-2024:1493
reference_id RHSA-2024:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1493
33
reference_url https://access.redhat.com/errata/RHSA-2024:1494
reference_id RHSA-2024:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1494
34
reference_url https://access.redhat.com/errata/RHSA-2024:1495
reference_id RHSA-2024:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1495
35
reference_url https://access.redhat.com/errata/RHSA-2024:1496
reference_id RHSA-2024:1496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1496
36
reference_url https://access.redhat.com/errata/RHSA-2024:1497
reference_id RHSA-2024:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1497
37
reference_url https://access.redhat.com/errata/RHSA-2024:1498
reference_id RHSA-2024:1498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1498
38
reference_url https://access.redhat.com/errata/RHSA-2024:1499
reference_id RHSA-2024:1499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1499
39
reference_url https://access.redhat.com/errata/RHSA-2024:1500
reference_id RHSA-2024:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1500
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1876675
reference_id show_bug.cgi?id=1876675
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1876675
41
reference_url https://usn.ubuntu.com/6703-1/
reference_id USN-6703-1
reference_type
scores
url https://usn.ubuntu.com/6703-1/
42
reference_url https://usn.ubuntu.com/6717-1/
reference_id USN-6717-1
reference_type
scores
url https://usn.ubuntu.com/6717-1/
fixed_packages
0
url pkg:deb/debian/firefox@124.0-1?distro=sid
purl pkg:deb/debian/firefox@124.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2024-2611
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3vbp-2h4f-7bav
3
url VCID-41g2-dvb2-yqhg
vulnerability_id VCID-41g2-dvb2-yqhg
summary Memory safety bugs present in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2614.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2614.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2614
reference_id
reference_type
scores
0
value 0.01437
scoring_system epss
scoring_elements 0.80734
published_at 2026-04-18T12:55:00Z
1
value 0.01437
scoring_system epss
scoring_elements 0.80699
published_at 2026-04-13T12:55:00Z
2
value 0.01437
scoring_system epss
scoring_elements 0.80649
published_at 2026-04-02T12:55:00Z
3
value 0.01437
scoring_system epss
scoring_elements 0.80704
published_at 2026-04-09T12:55:00Z
4
value 0.01437
scoring_system epss
scoring_elements 0.80694
published_at 2026-04-08T12:55:00Z
5
value 0.01437
scoring_system epss
scoring_elements 0.80666
published_at 2026-04-07T12:55:00Z
6
value 0.01437
scoring_system epss
scoring_elements 0.80671
published_at 2026-04-04T12:55:00Z
7
value 0.01437
scoring_system epss
scoring_elements 0.80707
published_at 2026-04-12T12:55:00Z
8
value 0.01437
scoring_system epss
scoring_elements 0.80721
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2614
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270666
reference_id 2270666
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270666
14
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1685358%2C1861016%2C1880405%2C1881093
reference_id buglist.cgi?bug_id=1685358%2C1861016%2C1880405%2C1881093
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1685358%2C1861016%2C1880405%2C1881093
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
reference_id mfsa2024-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-12/
reference_id mfsa2024-12
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/
url https://www.mozilla.org/security/advisories/mfsa2024-12/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
reference_id mfsa2024-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
18
reference_url https://www.mozilla.org/security/advisories/mfsa2024-13/
reference_id mfsa2024-13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/
url https://www.mozilla.org/security/advisories/mfsa2024-13/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
reference_id mfsa2024-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
20
reference_url https://www.mozilla.org/security/advisories/mfsa2024-14/
reference_id mfsa2024-14
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/
url https://www.mozilla.org/security/advisories/mfsa2024-14/
21
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
22
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
23
reference_url https://access.redhat.com/errata/RHSA-2024:1483
reference_id RHSA-2024:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1483
24
reference_url https://access.redhat.com/errata/RHSA-2024:1484
reference_id RHSA-2024:1484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1484
25
reference_url https://access.redhat.com/errata/RHSA-2024:1485
reference_id RHSA-2024:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1485
26
reference_url https://access.redhat.com/errata/RHSA-2024:1486
reference_id RHSA-2024:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1486
27
reference_url https://access.redhat.com/errata/RHSA-2024:1487
reference_id RHSA-2024:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1487
28
reference_url https://access.redhat.com/errata/RHSA-2024:1488
reference_id RHSA-2024:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1488
29
reference_url https://access.redhat.com/errata/RHSA-2024:1489
reference_id RHSA-2024:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1489
30
reference_url https://access.redhat.com/errata/RHSA-2024:1490
reference_id RHSA-2024:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1490
31
reference_url https://access.redhat.com/errata/RHSA-2024:1491
reference_id RHSA-2024:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1491
32
reference_url https://access.redhat.com/errata/RHSA-2024:1492
reference_id RHSA-2024:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1492
33
reference_url https://access.redhat.com/errata/RHSA-2024:1493
reference_id RHSA-2024:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1493
34
reference_url https://access.redhat.com/errata/RHSA-2024:1494
reference_id RHSA-2024:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1494
35
reference_url https://access.redhat.com/errata/RHSA-2024:1495
reference_id RHSA-2024:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1495
36
reference_url https://access.redhat.com/errata/RHSA-2024:1496
reference_id RHSA-2024:1496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1496
37
reference_url https://access.redhat.com/errata/RHSA-2024:1497
reference_id RHSA-2024:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1497
38
reference_url https://access.redhat.com/errata/RHSA-2024:1498
reference_id RHSA-2024:1498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1498
39
reference_url https://access.redhat.com/errata/RHSA-2024:1499
reference_id RHSA-2024:1499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1499
40
reference_url https://access.redhat.com/errata/RHSA-2024:1500
reference_id RHSA-2024:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1500
41
reference_url https://usn.ubuntu.com/6703-1/
reference_id USN-6703-1
reference_type
scores
url https://usn.ubuntu.com/6703-1/
42
reference_url https://usn.ubuntu.com/6717-1/
reference_id USN-6717-1
reference_type
scores
url https://usn.ubuntu.com/6717-1/
fixed_packages
0
url pkg:deb/debian/firefox@124.0-1?distro=sid
purl pkg:deb/debian/firefox@124.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2024-2614
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-41g2-dvb2-yqhg
4
url VCID-4bfx-2qxt-jfha
vulnerability_id VCID-4bfx-2qxt-jfha
summary Memory safety bugs present in Firefox 123. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2615
reference_id
reference_type
scores
0
value 0.00207
scoring_system epss
scoring_elements 0.43054
published_at 2026-04-18T12:55:00Z
1
value 0.00207
scoring_system epss
scoring_elements 0.43023
published_at 2026-04-08T12:55:00Z
2
value 0.00207
scoring_system epss
scoring_elements 0.43036
published_at 2026-04-09T12:55:00Z
3
value 0.00207
scoring_system epss
scoring_elements 0.43058
published_at 2026-04-11T12:55:00Z
4
value 0.00207
scoring_system epss
scoring_elements 0.43024
published_at 2026-04-12T12:55:00Z
5
value 0.00207
scoring_system epss
scoring_elements 0.43007
published_at 2026-04-13T12:55:00Z
6
value 0.00207
scoring_system epss
scoring_elements 0.43066
published_at 2026-04-16T12:55:00Z
7
value 0.00207
scoring_system epss
scoring_elements 0.4301
published_at 2026-04-02T12:55:00Z
8
value 0.00207
scoring_system epss
scoring_elements 0.43037
published_at 2026-04-04T12:55:00Z
9
value 0.00207
scoring_system epss
scoring_elements 0.42973
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2615
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1881074%2C1882438%2C1881650
reference_id buglist.cgi?bug_id=1881074%2C1882438%2C1881650
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:54:46Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1881074%2C1882438%2C1881650
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
reference_id mfsa2024-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
4
reference_url https://www.mozilla.org/security/advisories/mfsa2024-12/
reference_id mfsa2024-12
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:54:46Z/
url https://www.mozilla.org/security/advisories/mfsa2024-12/
5
reference_url https://usn.ubuntu.com/6703-1/
reference_id USN-6703-1
reference_type
scores
url https://usn.ubuntu.com/6703-1/
fixed_packages
0
url pkg:deb/debian/firefox@124.0-1?distro=sid
purl pkg:deb/debian/firefox@124.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2024-2615
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4bfx-2qxt-jfha
5
url VCID-b5y9-qmw5-nkbv
vulnerability_id VCID-b5y9-qmw5-nkbv
summary If an attacker could find a way to trigger a particular code path in SafeRefPtr, it could have triggered a crash or potentially be leveraged to achieve code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2612.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2612.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2612
reference_id
reference_type
scores
0
value 0.01138
scoring_system epss
scoring_elements 0.78349
published_at 2026-04-02T12:55:00Z
1
value 0.01138
scoring_system epss
scoring_elements 0.7838
published_at 2026-04-04T12:55:00Z
2
value 0.01536
scoring_system epss
scoring_elements 0.81339
published_at 2026-04-13T12:55:00Z
3
value 0.01536
scoring_system epss
scoring_elements 0.81347
published_at 2026-04-12T12:55:00Z
4
value 0.01536
scoring_system epss
scoring_elements 0.81379
published_at 2026-04-18T12:55:00Z
5
value 0.01536
scoring_system epss
scoring_elements 0.81377
published_at 2026-04-16T12:55:00Z
6
value 0.01536
scoring_system epss
scoring_elements 0.81361
published_at 2026-04-11T12:55:00Z
7
value 0.01536
scoring_system epss
scoring_elements 0.81341
published_at 2026-04-09T12:55:00Z
8
value 0.01536
scoring_system epss
scoring_elements 0.81335
published_at 2026-04-08T12:55:00Z
9
value 0.01536
scoring_system epss
scoring_elements 0.81307
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2612
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270665
reference_id 2270665
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270665
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
reference_id mfsa2024-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-12/
reference_id mfsa2024-12
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/
url https://www.mozilla.org/security/advisories/mfsa2024-12/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
reference_id mfsa2024-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-13/
reference_id mfsa2024-13
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/
url https://www.mozilla.org/security/advisories/mfsa2024-13/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
reference_id mfsa2024-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-14/
reference_id mfsa2024-14
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/
url https://www.mozilla.org/security/advisories/mfsa2024-14/
20
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
21
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
22
reference_url https://access.redhat.com/errata/RHSA-2024:1483
reference_id RHSA-2024:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1483
23
reference_url https://access.redhat.com/errata/RHSA-2024:1484
reference_id RHSA-2024:1484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1484
24
reference_url https://access.redhat.com/errata/RHSA-2024:1485
reference_id RHSA-2024:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1485
25
reference_url https://access.redhat.com/errata/RHSA-2024:1486
reference_id RHSA-2024:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1486
26
reference_url https://access.redhat.com/errata/RHSA-2024:1487
reference_id RHSA-2024:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1487
27
reference_url https://access.redhat.com/errata/RHSA-2024:1488
reference_id RHSA-2024:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1488
28
reference_url https://access.redhat.com/errata/RHSA-2024:1489
reference_id RHSA-2024:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1489
29
reference_url https://access.redhat.com/errata/RHSA-2024:1490
reference_id RHSA-2024:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1490
30
reference_url https://access.redhat.com/errata/RHSA-2024:1491
reference_id RHSA-2024:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1491
31
reference_url https://access.redhat.com/errata/RHSA-2024:1492
reference_id RHSA-2024:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1492
32
reference_url https://access.redhat.com/errata/RHSA-2024:1493
reference_id RHSA-2024:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1493
33
reference_url https://access.redhat.com/errata/RHSA-2024:1494
reference_id RHSA-2024:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1494
34
reference_url https://access.redhat.com/errata/RHSA-2024:1495
reference_id RHSA-2024:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1495
35
reference_url https://access.redhat.com/errata/RHSA-2024:1496
reference_id RHSA-2024:1496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1496
36
reference_url https://access.redhat.com/errata/RHSA-2024:1497
reference_id RHSA-2024:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1497
37
reference_url https://access.redhat.com/errata/RHSA-2024:1498
reference_id RHSA-2024:1498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1498
38
reference_url https://access.redhat.com/errata/RHSA-2024:1499
reference_id RHSA-2024:1499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1499
39
reference_url https://access.redhat.com/errata/RHSA-2024:1500
reference_id RHSA-2024:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1500
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1879444
reference_id show_bug.cgi?id=1879444
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1879444
41
reference_url https://usn.ubuntu.com/6703-1/
reference_id USN-6703-1
reference_type
scores
url https://usn.ubuntu.com/6703-1/
42
reference_url https://usn.ubuntu.com/6717-1/
reference_id USN-6717-1
reference_type
scores
url https://usn.ubuntu.com/6717-1/
fixed_packages
0
url pkg:deb/debian/firefox@124.0-1?distro=sid
purl pkg:deb/debian/firefox@124.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2024-2612
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b5y9-qmw5-nkbv
6
url VCID-fg7v-fypu-k3h4
vulnerability_id VCID-fg7v-fypu-k3h4
summary Passing invalid data could have led to invalid wasm values being created, such as arbitrary integers turning into pointer values.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2606
reference_id
reference_type
scores
0
value 0.00198
scoring_system epss
scoring_elements 0.41838
published_at 2026-04-18T12:55:00Z
1
value 0.00198
scoring_system epss
scoring_elements 0.41826
published_at 2026-04-08T12:55:00Z
2
value 0.00198
scoring_system epss
scoring_elements 0.41836
published_at 2026-04-09T12:55:00Z
3
value 0.00198
scoring_system epss
scoring_elements 0.4186
published_at 2026-04-11T12:55:00Z
4
value 0.00198
scoring_system epss
scoring_elements 0.41827
published_at 2026-04-12T12:55:00Z
5
value 0.00198
scoring_system epss
scoring_elements 0.41814
published_at 2026-04-13T12:55:00Z
6
value 0.00198
scoring_system epss
scoring_elements 0.41864
published_at 2026-04-16T12:55:00Z
7
value 0.00198
scoring_system epss
scoring_elements 0.41819
published_at 2026-04-02T12:55:00Z
8
value 0.00198
scoring_system epss
scoring_elements 0.41848
published_at 2026-04-04T12:55:00Z
9
value 0.00198
scoring_system epss
scoring_elements 0.41776
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2606
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
reference_id mfsa2024-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
3
reference_url https://www.mozilla.org/security/advisories/mfsa2024-12/
reference_id mfsa2024-12
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T14:50:19Z/
url https://www.mozilla.org/security/advisories/mfsa2024-12/
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1879237
reference_id show_bug.cgi?id=1879237
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T14:50:19Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1879237
5
reference_url https://usn.ubuntu.com/6703-1/
reference_id USN-6703-1
reference_type
scores
url https://usn.ubuntu.com/6703-1/
fixed_packages
0
url pkg:deb/debian/firefox@124.0-1?distro=sid
purl pkg:deb/debian/firefox@124.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2024-2606
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fg7v-fypu-k3h4
7
url VCID-g24d-23zk-6fgn
vulnerability_id VCID-g24d-23zk-6fgn
summary AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding() and AppendEncodedCharacters() could have experienced integer overflows, causing underallocation of an output buffer leading to an out of bounds write.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2608.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2608.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2608
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.36956
published_at 2026-04-02T12:55:00Z
1
value 0.0016
scoring_system epss
scoring_elements 0.3699
published_at 2026-04-04T12:55:00Z
2
value 0.0019
scoring_system epss
scoring_elements 0.40864
published_at 2026-04-13T12:55:00Z
3
value 0.0019
scoring_system epss
scoring_elements 0.40884
published_at 2026-04-12T12:55:00Z
4
value 0.0019
scoring_system epss
scoring_elements 0.40877
published_at 2026-04-18T12:55:00Z
5
value 0.0019
scoring_system epss
scoring_elements 0.40907
published_at 2026-04-16T12:55:00Z
6
value 0.0019
scoring_system epss
scoring_elements 0.40902
published_at 2026-04-09T12:55:00Z
7
value 0.0019
scoring_system epss
scoring_elements 0.40896
published_at 2026-04-08T12:55:00Z
8
value 0.0019
scoring_system epss
scoring_elements 0.40847
published_at 2026-04-07T12:55:00Z
9
value 0.0019
scoring_system epss
scoring_elements 0.40919
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2608
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270661
reference_id 2270661
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270661
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
reference_id mfsa2024-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-12/
reference_id mfsa2024-12
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/
url https://www.mozilla.org/security/advisories/mfsa2024-12/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
reference_id mfsa2024-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-13/
reference_id mfsa2024-13
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/
url https://www.mozilla.org/security/advisories/mfsa2024-13/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
reference_id mfsa2024-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-14/
reference_id mfsa2024-14
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/
url https://www.mozilla.org/security/advisories/mfsa2024-14/
20
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
21
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
22
reference_url https://access.redhat.com/errata/RHSA-2024:1483
reference_id RHSA-2024:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1483
23
reference_url https://access.redhat.com/errata/RHSA-2024:1484
reference_id RHSA-2024:1484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1484
24
reference_url https://access.redhat.com/errata/RHSA-2024:1485
reference_id RHSA-2024:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1485
25
reference_url https://access.redhat.com/errata/RHSA-2024:1486
reference_id RHSA-2024:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1486
26
reference_url https://access.redhat.com/errata/RHSA-2024:1487
reference_id RHSA-2024:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1487
27
reference_url https://access.redhat.com/errata/RHSA-2024:1488
reference_id RHSA-2024:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1488
28
reference_url https://access.redhat.com/errata/RHSA-2024:1489
reference_id RHSA-2024:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1489
29
reference_url https://access.redhat.com/errata/RHSA-2024:1490
reference_id RHSA-2024:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1490
30
reference_url https://access.redhat.com/errata/RHSA-2024:1491
reference_id RHSA-2024:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1491
31
reference_url https://access.redhat.com/errata/RHSA-2024:1492
reference_id RHSA-2024:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1492
32
reference_url https://access.redhat.com/errata/RHSA-2024:1493
reference_id RHSA-2024:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1493
33
reference_url https://access.redhat.com/errata/RHSA-2024:1494
reference_id RHSA-2024:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1494
34
reference_url https://access.redhat.com/errata/RHSA-2024:1495
reference_id RHSA-2024:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1495
35
reference_url https://access.redhat.com/errata/RHSA-2024:1496
reference_id RHSA-2024:1496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1496
36
reference_url https://access.redhat.com/errata/RHSA-2024:1497
reference_id RHSA-2024:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1497
37
reference_url https://access.redhat.com/errata/RHSA-2024:1498
reference_id RHSA-2024:1498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1498
38
reference_url https://access.redhat.com/errata/RHSA-2024:1499
reference_id RHSA-2024:1499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1499
39
reference_url https://access.redhat.com/errata/RHSA-2024:1500
reference_id RHSA-2024:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1500
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1880692
reference_id show_bug.cgi?id=1880692
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1880692
41
reference_url https://usn.ubuntu.com/6703-1/
reference_id USN-6703-1
reference_type
scores
url https://usn.ubuntu.com/6703-1/
42
reference_url https://usn.ubuntu.com/6717-1/
reference_id USN-6717-1
reference_type
scores
url https://usn.ubuntu.com/6717-1/
fixed_packages
0
url pkg:deb/debian/firefox@124.0-1?distro=sid
purl pkg:deb/debian/firefox@124.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2024-2608
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g24d-23zk-6fgn
8
url VCID-n8gb-hpjb-v7a5
vulnerability_id VCID-n8gb-hpjb-v7a5
summary Return registers were overwritten which could have allowed an attacker to execute arbitrary code. *Note:* This issue only affected Armv7-A systems. Other operating systems are unaffected.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2607.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2607.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2607
reference_id
reference_type
scores
0
value 0.01453
scoring_system epss
scoring_elements 0.80834
published_at 2026-04-18T12:55:00Z
1
value 0.01453
scoring_system epss
scoring_elements 0.80832
published_at 2026-04-16T12:55:00Z
2
value 0.01453
scoring_system epss
scoring_elements 0.80795
published_at 2026-04-13T12:55:00Z
3
value 0.01453
scoring_system epss
scoring_elements 0.80803
published_at 2026-04-12T12:55:00Z
4
value 0.01453
scoring_system epss
scoring_elements 0.80817
published_at 2026-04-11T12:55:00Z
5
value 0.01453
scoring_system epss
scoring_elements 0.80766
published_at 2026-04-04T12:55:00Z
6
value 0.01453
scoring_system epss
scoring_elements 0.80801
published_at 2026-04-09T12:55:00Z
7
value 0.01453
scoring_system epss
scoring_elements 0.80792
published_at 2026-04-08T12:55:00Z
8
value 0.01453
scoring_system epss
scoring_elements 0.80764
published_at 2026-04-07T12:55:00Z
9
value 0.01453
scoring_system epss
scoring_elements 0.80746
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2607
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270660
reference_id 2270660
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270660
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
reference_id mfsa2024-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-12/
reference_id mfsa2024-12
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/
url https://www.mozilla.org/security/advisories/mfsa2024-12/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
reference_id mfsa2024-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-13/
reference_id mfsa2024-13
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/
url https://www.mozilla.org/security/advisories/mfsa2024-13/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
reference_id mfsa2024-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-14/
reference_id mfsa2024-14
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/
url https://www.mozilla.org/security/advisories/mfsa2024-14/
20
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
21
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
22
reference_url https://access.redhat.com/errata/RHSA-2024:1483
reference_id RHSA-2024:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1483
23
reference_url https://access.redhat.com/errata/RHSA-2024:1484
reference_id RHSA-2024:1484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1484
24
reference_url https://access.redhat.com/errata/RHSA-2024:1485
reference_id RHSA-2024:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1485
25
reference_url https://access.redhat.com/errata/RHSA-2024:1486
reference_id RHSA-2024:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1486
26
reference_url https://access.redhat.com/errata/RHSA-2024:1487
reference_id RHSA-2024:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1487
27
reference_url https://access.redhat.com/errata/RHSA-2024:1488
reference_id RHSA-2024:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1488
28
reference_url https://access.redhat.com/errata/RHSA-2024:1489
reference_id RHSA-2024:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1489
29
reference_url https://access.redhat.com/errata/RHSA-2024:1490
reference_id RHSA-2024:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1490
30
reference_url https://access.redhat.com/errata/RHSA-2024:1491
reference_id RHSA-2024:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1491
31
reference_url https://access.redhat.com/errata/RHSA-2024:1492
reference_id RHSA-2024:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1492
32
reference_url https://access.redhat.com/errata/RHSA-2024:1493
reference_id RHSA-2024:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1493
33
reference_url https://access.redhat.com/errata/RHSA-2024:1494
reference_id RHSA-2024:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1494
34
reference_url https://access.redhat.com/errata/RHSA-2024:1495
reference_id RHSA-2024:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1495
35
reference_url https://access.redhat.com/errata/RHSA-2024:1496
reference_id RHSA-2024:1496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1496
36
reference_url https://access.redhat.com/errata/RHSA-2024:1497
reference_id RHSA-2024:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1497
37
reference_url https://access.redhat.com/errata/RHSA-2024:1498
reference_id RHSA-2024:1498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1498
38
reference_url https://access.redhat.com/errata/RHSA-2024:1499
reference_id RHSA-2024:1499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1499
39
reference_url https://access.redhat.com/errata/RHSA-2024:1500
reference_id RHSA-2024:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1500
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1879939
reference_id show_bug.cgi?id=1879939
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1879939
41
reference_url https://usn.ubuntu.com/6703-1/
reference_id USN-6703-1
reference_type
scores
url https://usn.ubuntu.com/6703-1/
42
reference_url https://usn.ubuntu.com/6717-1/
reference_id USN-6717-1
reference_type
scores
url https://usn.ubuntu.com/6717-1/
fixed_packages
0
url pkg:deb/debian/firefox@124.0-1?distro=sid
purl pkg:deb/debian/firefox@124.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2024-2607
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n8gb-hpjb-v7a5
9
url VCID-pse8-xnc7-gkbv
vulnerability_id VCID-pse8-xnc7-gkbv
summary Using a markup injection an attacker could have stolen nonce values. This could have been used to bypass strict content security policies.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2610.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2610.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2610
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.39199
published_at 2026-04-02T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39221
published_at 2026-04-04T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.47018
published_at 2026-04-13T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.47011
published_at 2026-04-12T12:55:00Z
4
value 0.00239
scoring_system epss
scoring_elements 0.47069
published_at 2026-04-18T12:55:00Z
5
value 0.00239
scoring_system epss
scoring_elements 0.47074
published_at 2026-04-16T12:55:00Z
6
value 0.00239
scoring_system epss
scoring_elements 0.47038
published_at 2026-04-11T12:55:00Z
7
value 0.00239
scoring_system epss
scoring_elements 0.47013
published_at 2026-04-09T12:55:00Z
8
value 0.00239
scoring_system epss
scoring_elements 0.47016
published_at 2026-04-08T12:55:00Z
9
value 0.00239
scoring_system epss
scoring_elements 0.46961
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2610
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270663
reference_id 2270663
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270663
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
reference_id mfsa2024-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-12/
reference_id mfsa2024-12
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/
url https://www.mozilla.org/security/advisories/mfsa2024-12/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
reference_id mfsa2024-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-13/
reference_id mfsa2024-13
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/
url https://www.mozilla.org/security/advisories/mfsa2024-13/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
reference_id mfsa2024-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-14/
reference_id mfsa2024-14
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/
url https://www.mozilla.org/security/advisories/mfsa2024-14/
20
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
21
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
22
reference_url https://access.redhat.com/errata/RHSA-2024:1483
reference_id RHSA-2024:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1483
23
reference_url https://access.redhat.com/errata/RHSA-2024:1484
reference_id RHSA-2024:1484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1484
24
reference_url https://access.redhat.com/errata/RHSA-2024:1485
reference_id RHSA-2024:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1485
25
reference_url https://access.redhat.com/errata/RHSA-2024:1486
reference_id RHSA-2024:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1486
26
reference_url https://access.redhat.com/errata/RHSA-2024:1487
reference_id RHSA-2024:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1487
27
reference_url https://access.redhat.com/errata/RHSA-2024:1488
reference_id RHSA-2024:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1488
28
reference_url https://access.redhat.com/errata/RHSA-2024:1489
reference_id RHSA-2024:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1489
29
reference_url https://access.redhat.com/errata/RHSA-2024:1490
reference_id RHSA-2024:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1490
30
reference_url https://access.redhat.com/errata/RHSA-2024:1491
reference_id RHSA-2024:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1491
31
reference_url https://access.redhat.com/errata/RHSA-2024:1492
reference_id RHSA-2024:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1492
32
reference_url https://access.redhat.com/errata/RHSA-2024:1493
reference_id RHSA-2024:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1493
33
reference_url https://access.redhat.com/errata/RHSA-2024:1494
reference_id RHSA-2024:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1494
34
reference_url https://access.redhat.com/errata/RHSA-2024:1495
reference_id RHSA-2024:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1495
35
reference_url https://access.redhat.com/errata/RHSA-2024:1496
reference_id RHSA-2024:1496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1496
36
reference_url https://access.redhat.com/errata/RHSA-2024:1497
reference_id RHSA-2024:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1497
37
reference_url https://access.redhat.com/errata/RHSA-2024:1498
reference_id RHSA-2024:1498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1498
38
reference_url https://access.redhat.com/errata/RHSA-2024:1499
reference_id RHSA-2024:1499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1499
39
reference_url https://access.redhat.com/errata/RHSA-2024:1500
reference_id RHSA-2024:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1500
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1871112
reference_id show_bug.cgi?id=1871112
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1871112
41
reference_url https://usn.ubuntu.com/6703-1/
reference_id USN-6703-1
reference_type
scores
url https://usn.ubuntu.com/6703-1/
42
reference_url https://usn.ubuntu.com/6717-1/
reference_id USN-6717-1
reference_type
scores
url https://usn.ubuntu.com/6717-1/
fixed_packages
0
url pkg:deb/debian/firefox@124.0-1?distro=sid
purl pkg:deb/debian/firefox@124.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2024-2610
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pse8-xnc7-gkbv
10
url VCID-v5gq-2gv5-gycv
vulnerability_id VCID-v5gq-2gv5-gycv
summary Data was not properly sanitized when decoding a QUIC ACK frame; this could have led to unrestricted memory consumption and a crash.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2613
reference_id
reference_type
scores
0
value 0.0013
scoring_system epss
scoring_elements 0.32444
published_at 2026-04-18T12:55:00Z
1
value 0.0013
scoring_system epss
scoring_elements 0.32464
published_at 2026-04-08T12:55:00Z
2
value 0.0013
scoring_system epss
scoring_elements 0.32491
published_at 2026-04-09T12:55:00Z
3
value 0.0013
scoring_system epss
scoring_elements 0.32495
published_at 2026-04-11T12:55:00Z
4
value 0.0013
scoring_system epss
scoring_elements 0.32456
published_at 2026-04-12T12:55:00Z
5
value 0.0013
scoring_system epss
scoring_elements 0.3243
published_at 2026-04-13T12:55:00Z
6
value 0.0013
scoring_system epss
scoring_elements 0.32465
published_at 2026-04-16T12:55:00Z
7
value 0.0013
scoring_system epss
scoring_elements 0.32556
published_at 2026-04-02T12:55:00Z
8
value 0.0013
scoring_system epss
scoring_elements 0.32593
published_at 2026-04-04T12:55:00Z
9
value 0.0013
scoring_system epss
scoring_elements 0.32416
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2613
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
reference_id mfsa2024-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-12
3
reference_url https://www.mozilla.org/security/advisories/mfsa2024-12/
reference_id mfsa2024-12
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-02T19:42:05Z/
url https://www.mozilla.org/security/advisories/mfsa2024-12/
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1875701
reference_id show_bug.cgi?id=1875701
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-02T19:42:05Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1875701
5
reference_url https://usn.ubuntu.com/6703-1/
reference_id USN-6703-1
reference_type
scores
url https://usn.ubuntu.com/6703-1/
fixed_packages
0
url pkg:deb/debian/firefox@124.0-1?distro=sid
purl pkg:deb/debian/firefox@124.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2024-2613
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v5gq-2gv5-gycv
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid