Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/75875?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "type": "ebuild", "namespace": "www-client", "name": "firefox-bin", "version": "134.0", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "137.0.1", "latest_non_vulnerable_version": "137.0.1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36153?format=api", "vulnerability_id": "VCID-19vv-zhum-43hp", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10468.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10468.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10468", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50563", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.5053", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50484", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50538", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50535", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50577", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50553", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50539", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50581", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50586", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50503", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10468" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322443", "reference_id": "2322443", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322443" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-08", "reference_id": "GLSA-202505-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-55", "reference_id": "mfsa2024-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-55" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", "reference_id": "mfsa2024-55", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:16:38Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-59", "reference_id": "mfsa2024-59", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-59" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", "reference_id": "mfsa2024-59", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:16:38Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1914982", "reference_id": "show_bug.cgi?id=1914982", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:16:38Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1914982" }, { "reference_url": "https://usn.ubuntu.com/7086-1/", "reference_id": "USN-7086-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7086-1/" }, { "reference_url": "https://usn.ubuntu.com/7991-1/", "reference_id": "USN-7991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-10468" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-19vv-zhum-43hp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41995?format=api", "vulnerability_id": "VCID-1zf8-qjts-9fbc", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11704.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11704.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11704", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42099", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42089", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42124", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42101", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42037", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42112", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42061", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42072", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42086", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50639", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50617", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11704" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328942", "reference_id": "2328942", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328942" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-03", "reference_id": "GLSA-202505-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-03" }, { "reference_url": "https://security.gentoo.org/glsa/202509-02", "reference_id": "GLSA-202509-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202509-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:21:47Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:21:47Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-09", "reference_id": "mfsa2025-09", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-09" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-09/", "reference_id": "mfsa2025-09", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:21:47Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-09/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-10", "reference_id": "mfsa2025-10", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-10" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-10/", "reference_id": "mfsa2025-10", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:21:47Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-10/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1899402", "reference_id": "show_bug.cgi?id=1899402", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:21:47Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1899402" }, { "reference_url": "https://usn.ubuntu.com/7134-1/", "reference_id": "USN-7134-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7134-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-11704" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1zf8-qjts-9fbc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41997?format=api", "vulnerability_id": "VCID-3fpq-jre6-53fs", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11706.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11706.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11706", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.38253", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.38413", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.38277", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.38327", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.38336", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.38353", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.38316", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.38291", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.38339", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.38317", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00171", "scoring_system": "epss", "scoring_elements": "0.38389", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11706" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328951", "reference_id": "2328951", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328951" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-03", "reference_id": "GLSA-202505-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-03" }, { "reference_url": "https://security.gentoo.org/glsa/202509-02", "reference_id": "GLSA-202509-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202509-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-26T16:29:42Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-26T16:29:42Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1923767", "reference_id": "show_bug.cgi?id=1923767", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-26T16:29:42Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1923767" }, { "reference_url": "https://usn.ubuntu.com/7134-1/", "reference_id": "USN-7134-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7134-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-11706" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3fpq-jre6-53fs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42004?format=api", "vulnerability_id": "VCID-4zjw-4gjw-pqh1", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0242.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0242.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0242", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02414", "scoring_system": "epss", "scoring_elements": "0.85129", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02914", "scoring_system": "epss", "scoring_elements": "0.86342", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02914", "scoring_system": "epss", "scoring_elements": "0.86394", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02914", "scoring_system": "epss", "scoring_elements": "0.86377", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02914", "scoring_system": "epss", "scoring_elements": "0.86383", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02914", "scoring_system": "epss", "scoring_elements": "0.86385", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02914", "scoring_system": "epss", "scoring_elements": "0.86371", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02914", "scoring_system": "epss", "scoring_elements": "0.86362", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02914", "scoring_system": "epss", "scoring_elements": "0.86343", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02914", "scoring_system": "epss", "scoring_elements": "0.86324", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02914", "scoring_system": "epss", "scoring_elements": "0.86399", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0242" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0242" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2336181", "reference_id": "2336181", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2336181" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1874523%2C1926454%2C1931873%2C1932169", "reference_id": "buglist.cgi?bug_id=1874523%2C1926454%2C1931873%2C1932169", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T16:40:52Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1874523%2C1926454%2C1931873%2C1932169" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-03", "reference_id": "GLSA-202505-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-03" }, { "reference_url": "https://security.gentoo.org/glsa/202509-02", "reference_id": "GLSA-202509-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202509-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-01", "reference_id": "mfsa2025-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-01/", "reference_id": "mfsa2025-01", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T16:40:52Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-02", "reference_id": "mfsa2025-02", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-02/", "reference_id": "mfsa2025-02", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T16:40:52Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-03", "reference_id": "mfsa2025-03", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-03" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-03/", "reference_id": "mfsa2025-03", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T16:40:52Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-03/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-04", "reference_id": "mfsa2025-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-04/", "reference_id": "mfsa2025-04", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T16:40:52Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-04/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-05", "reference_id": "mfsa2025-05", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-05" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-05/", "reference_id": "mfsa2025-05", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T16:40:52Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-05/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0080", "reference_id": "RHSA-2025:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0132", "reference_id": "RHSA-2025:0132", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0132" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0133", "reference_id": "RHSA-2025:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0134", "reference_id": "RHSA-2025:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0135", "reference_id": "RHSA-2025:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0136", "reference_id": "RHSA-2025:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0137", "reference_id": "RHSA-2025:0137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0138", "reference_id": "RHSA-2025:0138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0144", "reference_id": "RHSA-2025:0144", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0144" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0147", "reference_id": "RHSA-2025:0147", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0147" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0162", "reference_id": "RHSA-2025:0162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0165", "reference_id": "RHSA-2025:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0166", "reference_id": "RHSA-2025:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0167", "reference_id": "RHSA-2025:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0275", "reference_id": "RHSA-2025:0275", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0275" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0281", "reference_id": "RHSA-2025:0281", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0281" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0284", "reference_id": "RHSA-2025:0284", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0284" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0286", "reference_id": "RHSA-2025:0286", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0286" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0287", "reference_id": "RHSA-2025:0287", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0287" }, { "reference_url": "https://usn.ubuntu.com/7191-1/", "reference_id": "USN-7191-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7191-1/" }, { "reference_url": "https://usn.ubuntu.com/7663-1/", "reference_id": "USN-7663-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7663-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2025-0242" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4zjw-4gjw-pqh1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41987?format=api", "vulnerability_id": "VCID-5j6z-g7gt-qyea", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11694.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11694.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11694", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32759", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32663", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32625", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32653", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32691", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32689", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32664", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32616", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32795", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.3732", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39421", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11694" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11694", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11694" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328941", "reference_id": "2328941", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328941" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-03", "reference_id": "GLSA-202505-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-03" }, { "reference_url": "https://security.gentoo.org/glsa/202509-02", "reference_id": "GLSA-202509-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202509-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64", "reference_id": "mfsa2024-64", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-64/", "reference_id": "mfsa2024-64", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-64/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-65", "reference_id": "mfsa2024-65", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-65" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-65/", "reference_id": "mfsa2024-65", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-65/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68", "reference_id": "mfsa2024-68", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-68/", "reference_id": "mfsa2024-68", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-68/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-70", "reference_id": "mfsa2024-70", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-70" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-70/", "reference_id": "mfsa2024-70", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-70/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10591", "reference_id": "RHSA-2024:10591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10592", "reference_id": "RHSA-2024:10592", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10592" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10667", "reference_id": "RHSA-2024:10667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10702", "reference_id": "RHSA-2024:10702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10703", "reference_id": "RHSA-2024:10703", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10703" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10704", "reference_id": "RHSA-2024:10704", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10704" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10710", "reference_id": "RHSA-2024:10710", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10710" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10733", "reference_id": "RHSA-2024:10733", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10733" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10734", "reference_id": "RHSA-2024:10734", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10734" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10742", "reference_id": "RHSA-2024:10742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10743", "reference_id": "RHSA-2024:10743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10745", "reference_id": "RHSA-2024:10745", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10745" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10748", "reference_id": "RHSA-2024:10748", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10748" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10752", "reference_id": "RHSA-2024:10752", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10752" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10844", "reference_id": "RHSA-2024:10844", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10844" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10848", "reference_id": "RHSA-2024:10848", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10848" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10849", "reference_id": "RHSA-2024:10849", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10849" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10880", "reference_id": "RHSA-2024:10880", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10880" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10881", "reference_id": "RHSA-2024:10881", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10881" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1924167", "reference_id": "show_bug.cgi?id=1924167", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1924167" }, { "reference_url": "https://usn.ubuntu.com/7134-1/", "reference_id": "USN-7134-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7134-1/" }, { "reference_url": "https://usn.ubuntu.com/7193-1/", "reference_id": "USN-7193-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7193-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-11694" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5j6z-g7gt-qyea" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36147?format=api", "vulnerability_id": "VCID-6bbw-b3rx-a7hj", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10462.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10462.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10462", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66065", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66077", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66063", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66028", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66058", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66071", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66052", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.65994", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.6604", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.6599", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66023", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10462" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10462", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10462" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322440", "reference_id": "2322440", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322440" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-08", "reference_id": "GLSA-202505-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-55", "reference_id": "mfsa2024-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-55" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", "reference_id": "mfsa2024-55", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T15:00:03Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-56", "reference_id": "mfsa2024-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-56" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", "reference_id": "mfsa2024-56", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T15:00:03Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-58", "reference_id": "mfsa2024-58", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-58" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", "reference_id": "mfsa2024-58", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T15:00:03Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-59", "reference_id": "mfsa2024-59", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-59" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", "reference_id": "mfsa2024-59", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T15:00:03Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8720", "reference_id": "RHSA-2024:8720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8721", "reference_id": "RHSA-2024:8721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8722", "reference_id": "RHSA-2024:8722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8723", "reference_id": "RHSA-2024:8723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8724", "reference_id": "RHSA-2024:8724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8725", "reference_id": "RHSA-2024:8725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8726", "reference_id": "RHSA-2024:8726", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8726" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8727", "reference_id": "RHSA-2024:8727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8728", "reference_id": "RHSA-2024:8728", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8728" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8729", "reference_id": "RHSA-2024:8729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8790", "reference_id": "RHSA-2024:8790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8793", "reference_id": "RHSA-2024:8793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9015", "reference_id": "RHSA-2024:9015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9016", "reference_id": "RHSA-2024:9016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9017", "reference_id": "RHSA-2024:9017", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9017" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9018", "reference_id": "RHSA-2024:9018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9019", "reference_id": "RHSA-2024:9019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9552", "reference_id": "RHSA-2024:9552", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9552" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9554", "reference_id": "RHSA-2024:9554", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9554" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1920423", "reference_id": "show_bug.cgi?id=1920423", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T15:00:03Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1920423" }, { "reference_url": "https://usn.ubuntu.com/7086-1/", "reference_id": "USN-7086-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7086-1/" }, { "reference_url": "https://usn.ubuntu.com/7991-1/", "reference_id": "USN-7991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-10462" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6bbw-b3rx-a7hj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41998?format=api", "vulnerability_id": "VCID-73bd-e4pc-y7h6", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11708.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11708.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11708", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39416", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39537", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39451", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39507", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39522", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39533", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39495", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39478", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39528", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.395", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39514", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11708" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328939", "reference_id": "2328939", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328939" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-03", "reference_id": "GLSA-202505-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-03" }, { "reference_url": "https://security.gentoo.org/glsa/202509-02", "reference_id": "GLSA-202509-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202509-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:06:43Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:06:43Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1922912", "reference_id": "show_bug.cgi?id=1922912", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:06:43Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1922912" }, { "reference_url": "https://usn.ubuntu.com/7134-1/", "reference_id": "USN-7134-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7134-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-11708" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-73bd-e4pc-y7h6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41996?format=api", "vulnerability_id": "VCID-769r-8mmt-6qcc", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11705.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11705.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11705", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40763", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40718", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40737", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40752", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40745", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40695", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40744", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40771", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49038", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.4907", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11705" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328955", "reference_id": "2328955", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328955" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-03", "reference_id": "GLSA-202505-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-03" }, { "reference_url": "https://security.gentoo.org/glsa/202509-02", "reference_id": "GLSA-202509-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202509-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:11:54Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:11:54Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1921768", "reference_id": "show_bug.cgi?id=1921768", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:11:54Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1921768" }, { "reference_url": "https://usn.ubuntu.com/7134-1/", "reference_id": "USN-7134-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7134-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-11705" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-769r-8mmt-6qcc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41991?format=api", "vulnerability_id": "VCID-8k4z-rq29-mqg5", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11697.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11697.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11697", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22135", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.2202", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22081", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22122", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22104", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22048", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21968", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22184", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22018", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25514", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26995", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11697" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11697", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11697" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328950", "reference_id": "2328950", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328950" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-03", "reference_id": "GLSA-202505-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-03" }, { "reference_url": "https://security.gentoo.org/glsa/202509-02", "reference_id": "GLSA-202509-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202509-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:26:51Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64", "reference_id": "mfsa2024-64", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-64/", "reference_id": "mfsa2024-64", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:26:51Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-64/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:26:51Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68", "reference_id": "mfsa2024-68", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-68/", "reference_id": "mfsa2024-68", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:26:51Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-68/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10591", "reference_id": "RHSA-2024:10591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10592", "reference_id": "RHSA-2024:10592", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10592" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10667", "reference_id": "RHSA-2024:10667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10702", "reference_id": "RHSA-2024:10702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10703", "reference_id": "RHSA-2024:10703", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10703" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10704", "reference_id": "RHSA-2024:10704", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10704" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10710", "reference_id": "RHSA-2024:10710", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10710" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10733", "reference_id": "RHSA-2024:10733", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10733" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10734", "reference_id": "RHSA-2024:10734", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10734" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10742", "reference_id": "RHSA-2024:10742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10743", "reference_id": "RHSA-2024:10743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10745", "reference_id": "RHSA-2024:10745", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10745" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10748", "reference_id": "RHSA-2024:10748", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10748" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10752", "reference_id": "RHSA-2024:10752", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10752" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10844", "reference_id": "RHSA-2024:10844", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10844" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10848", "reference_id": "RHSA-2024:10848", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10848" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10849", "reference_id": "RHSA-2024:10849", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10849" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10880", "reference_id": "RHSA-2024:10880", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10880" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10881", "reference_id": "RHSA-2024:10881", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10881" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1842187", "reference_id": "show_bug.cgi?id=1842187", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:26:51Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1842187" }, { "reference_url": "https://usn.ubuntu.com/7134-1/", "reference_id": "USN-7134-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7134-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-11697" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8k4z-rq29-mqg5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36145?format=api", "vulnerability_id": "VCID-aemu-emvp-hkfh", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10460.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10460.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10460", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61919", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61936", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61931", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61832", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61883", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61834", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61862", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61888", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61908", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.6192", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61899", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10460" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10460", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10460" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322444", "reference_id": "2322444", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322444" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-08", "reference_id": "GLSA-202505-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-55", "reference_id": "mfsa2024-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-55" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", "reference_id": "mfsa2024-55", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:40:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-56", "reference_id": "mfsa2024-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-56" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", "reference_id": "mfsa2024-56", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:40:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-58", "reference_id": "mfsa2024-58", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-58" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", "reference_id": "mfsa2024-58", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:40:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-59", "reference_id": "mfsa2024-59", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-59" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", "reference_id": "mfsa2024-59", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:40:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8720", "reference_id": "RHSA-2024:8720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8721", "reference_id": "RHSA-2024:8721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8722", "reference_id": "RHSA-2024:8722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8723", "reference_id": "RHSA-2024:8723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8724", "reference_id": "RHSA-2024:8724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8725", "reference_id": "RHSA-2024:8725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8726", "reference_id": "RHSA-2024:8726", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8726" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8727", "reference_id": "RHSA-2024:8727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8728", "reference_id": "RHSA-2024:8728", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8728" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8729", "reference_id": "RHSA-2024:8729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8790", "reference_id": "RHSA-2024:8790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8793", "reference_id": "RHSA-2024:8793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9015", "reference_id": "RHSA-2024:9015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9016", "reference_id": "RHSA-2024:9016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9017", "reference_id": "RHSA-2024:9017", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9017" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9018", "reference_id": "RHSA-2024:9018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9019", "reference_id": "RHSA-2024:9019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9552", "reference_id": "RHSA-2024:9552", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9552" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9554", "reference_id": "RHSA-2024:9554", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9554" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1912537", "reference_id": "show_bug.cgi?id=1912537", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:40:17Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1912537" }, { "reference_url": "https://usn.ubuntu.com/7086-1/", "reference_id": "USN-7086-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7086-1/" }, { "reference_url": "https://usn.ubuntu.com/7991-1/", "reference_id": "USN-7991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-10460" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aemu-emvp-hkfh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41988?format=api", "vulnerability_id": "VCID-bjny-apx2-8ba1", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11695.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11695.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11695", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32591", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32466", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32492", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.3253", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32526", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32498", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.3245", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32627", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32501", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37155", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39232", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11695" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328948", "reference_id": "2328948", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328948" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-03", "reference_id": "GLSA-202505-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-03" }, { "reference_url": "https://security.gentoo.org/glsa/202509-02", "reference_id": "GLSA-202509-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202509-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:43:59Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64", "reference_id": "mfsa2024-64", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-64/", "reference_id": "mfsa2024-64", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:43:59Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-64/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:43:59Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68", "reference_id": "mfsa2024-68", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-68/", "reference_id": "mfsa2024-68", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:43:59Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-68/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10591", "reference_id": "RHSA-2024:10591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10592", "reference_id": "RHSA-2024:10592", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10592" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10667", "reference_id": "RHSA-2024:10667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10702", "reference_id": "RHSA-2024:10702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10703", "reference_id": "RHSA-2024:10703", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10703" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10704", "reference_id": "RHSA-2024:10704", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10704" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10710", "reference_id": "RHSA-2024:10710", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10710" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10733", "reference_id": "RHSA-2024:10733", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10733" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10734", "reference_id": "RHSA-2024:10734", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10734" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10742", "reference_id": "RHSA-2024:10742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10743", "reference_id": "RHSA-2024:10743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10745", "reference_id": "RHSA-2024:10745", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10745" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10748", "reference_id": "RHSA-2024:10748", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10748" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10752", "reference_id": "RHSA-2024:10752", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10752" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10844", "reference_id": "RHSA-2024:10844", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10844" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10848", "reference_id": "RHSA-2024:10848", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10848" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10849", "reference_id": "RHSA-2024:10849", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10849" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10880", "reference_id": "RHSA-2024:10880", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10880" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10881", "reference_id": "RHSA-2024:10881", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10881" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1925496", "reference_id": "show_bug.cgi?id=1925496", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:43:59Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1925496" }, { "reference_url": "https://usn.ubuntu.com/7134-1/", "reference_id": "USN-7134-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7134-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-11695" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bjny-apx2-8ba1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36144?format=api", "vulnerability_id": "VCID-bwk4-hqx8-97dy", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10459.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10459.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10459", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72276", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72289", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.7228", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72237", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.7222", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72195", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.722", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72251", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72267", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72244", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72232", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10459" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10459", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10459" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322429", "reference_id": "2322429", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322429" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-08", "reference_id": "GLSA-202505-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-55", "reference_id": "mfsa2024-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-55" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", "reference_id": "mfsa2024-55", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-56", "reference_id": "mfsa2024-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-56" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", "reference_id": "mfsa2024-56", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-57", "reference_id": "mfsa2024-57", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-57" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-57/", "reference_id": "mfsa2024-57", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-57/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-58", "reference_id": "mfsa2024-58", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-58" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", "reference_id": "mfsa2024-58", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-59", "reference_id": "mfsa2024-59", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-59" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", "reference_id": "mfsa2024-59", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8720", "reference_id": "RHSA-2024:8720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8721", "reference_id": "RHSA-2024:8721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8722", "reference_id": "RHSA-2024:8722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8723", "reference_id": "RHSA-2024:8723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8724", "reference_id": "RHSA-2024:8724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8725", "reference_id": "RHSA-2024:8725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8726", "reference_id": "RHSA-2024:8726", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8726" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8727", "reference_id": "RHSA-2024:8727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8728", "reference_id": "RHSA-2024:8728", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8728" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8729", "reference_id": "RHSA-2024:8729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8790", "reference_id": "RHSA-2024:8790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8793", "reference_id": "RHSA-2024:8793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9015", "reference_id": "RHSA-2024:9015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9016", "reference_id": "RHSA-2024:9016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9017", "reference_id": "RHSA-2024:9017", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9017" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9018", "reference_id": "RHSA-2024:9018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9019", "reference_id": "RHSA-2024:9019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9552", "reference_id": "RHSA-2024:9552", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9552" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9554", "reference_id": "RHSA-2024:9554", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9554" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1919087", "reference_id": "show_bug.cgi?id=1919087", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1919087" }, { "reference_url": "https://usn.ubuntu.com/7086-1/", "reference_id": "USN-7086-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7086-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-10459" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bwk4-hqx8-97dy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42006?format=api", "vulnerability_id": "VCID-dgxf-c2sb-5qds", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0247.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0247.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0247", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.15058", "scoring_system": "epss", "scoring_elements": "0.94573", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.15058", "scoring_system": "epss", "scoring_elements": "0.94553", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.15058", "scoring_system": "epss", "scoring_elements": "0.94555", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.15058", "scoring_system": "epss", "scoring_elements": "0.94565", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.15058", "scoring_system": "epss", "scoring_elements": "0.94569", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.15058", "scoring_system": "epss", "scoring_elements": "0.94575", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.15058", "scoring_system": "epss", "scoring_elements": "0.94545", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.15058", "scoring_system": "epss", "scoring_elements": "0.94593", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.15058", "scoring_system": "epss", "scoring_elements": "0.94589", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.15058", "scoring_system": "epss", "scoring_elements": "0.94576", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.15399", "scoring_system": "epss", "scoring_elements": "0.94665", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0247" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2336176", "reference_id": "2336176", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2336176" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1835193%2C1910021%2C1919803%2C1931576%2C1931948%2C1932173", "reference_id": "buglist.cgi?bug_id=1835193%2C1910021%2C1919803%2C1931576%2C1931948%2C1932173", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T14:52:46Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1835193%2C1910021%2C1919803%2C1931576%2C1931948%2C1932173" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-01", "reference_id": "mfsa2025-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-01/", "reference_id": "mfsa2025-01", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T14:52:46Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-04", "reference_id": "mfsa2025-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-04/", "reference_id": "mfsa2025-04", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T14:52:46Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-04/" }, { "reference_url": "https://usn.ubuntu.com/7191-1/", "reference_id": "USN-7191-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7191-1/" }, { "reference_url": "https://usn.ubuntu.com/7991-1/", "reference_id": "USN-7991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2025-0247" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dgxf-c2sb-5qds" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41989?format=api", "vulnerability_id": "VCID-dh5k-q87q-4qfs", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11696.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11696.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11696", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13839", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13713", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13762", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13799", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13831", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.1378", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13698", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13896", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13625", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17549", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18978", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11696" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328943", "reference_id": "2328943", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328943" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-03", "reference_id": "GLSA-202505-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-03" }, { "reference_url": "https://security.gentoo.org/glsa/202509-02", "reference_id": "GLSA-202509-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202509-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:02:13Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64", "reference_id": "mfsa2024-64", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-64/", "reference_id": "mfsa2024-64", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:02:13Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-64/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:02:13Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68", "reference_id": "mfsa2024-68", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-68/", "reference_id": "mfsa2024-68", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:02:13Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-68/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10591", "reference_id": "RHSA-2024:10591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10592", "reference_id": "RHSA-2024:10592", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10592" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10667", "reference_id": "RHSA-2024:10667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10702", "reference_id": "RHSA-2024:10702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10703", "reference_id": "RHSA-2024:10703", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10703" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10704", "reference_id": "RHSA-2024:10704", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10704" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10710", "reference_id": "RHSA-2024:10710", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10710" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10733", "reference_id": "RHSA-2024:10733", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10733" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10734", "reference_id": "RHSA-2024:10734", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10734" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10742", "reference_id": "RHSA-2024:10742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10743", "reference_id": "RHSA-2024:10743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10745", "reference_id": "RHSA-2024:10745", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10745" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10748", "reference_id": "RHSA-2024:10748", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10748" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10752", "reference_id": "RHSA-2024:10752", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10752" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10844", "reference_id": "RHSA-2024:10844", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10844" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10848", "reference_id": "RHSA-2024:10848", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10848" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10849", "reference_id": "RHSA-2024:10849", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10849" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10880", "reference_id": "RHSA-2024:10880", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10880" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10881", "reference_id": "RHSA-2024:10881", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10881" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1929600", "reference_id": "show_bug.cgi?id=1929600", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:02:13Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1929600" }, { "reference_url": "https://usn.ubuntu.com/7134-1/", "reference_id": "USN-7134-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7134-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-11696" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dh5k-q87q-4qfs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36149?format=api", "vulnerability_id": "VCID-ds2y-kn7q-vuct", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10464.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10464.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10464", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66945", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66963", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66949", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66916", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66947", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66961", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66941", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.6688", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66927", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66879", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66906", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10464" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10464", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10464" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322424", "reference_id": "2322424", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322424" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-08", "reference_id": "GLSA-202505-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-55", "reference_id": "mfsa2024-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-55" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", "reference_id": "mfsa2024-55", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:48:10Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-56", "reference_id": "mfsa2024-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-56" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", "reference_id": "mfsa2024-56", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:48:10Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-58", "reference_id": "mfsa2024-58", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-58" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", "reference_id": "mfsa2024-58", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:48:10Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-59", "reference_id": "mfsa2024-59", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-59" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", "reference_id": "mfsa2024-59", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:48:10Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8720", "reference_id": "RHSA-2024:8720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8721", "reference_id": "RHSA-2024:8721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8722", "reference_id": "RHSA-2024:8722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8723", "reference_id": "RHSA-2024:8723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8724", "reference_id": "RHSA-2024:8724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8725", "reference_id": "RHSA-2024:8725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8726", "reference_id": "RHSA-2024:8726", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8726" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8727", "reference_id": "RHSA-2024:8727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8728", "reference_id": "RHSA-2024:8728", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8728" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8729", "reference_id": "RHSA-2024:8729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8790", "reference_id": "RHSA-2024:8790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8793", "reference_id": "RHSA-2024:8793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9015", "reference_id": "RHSA-2024:9015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9016", "reference_id": "RHSA-2024:9016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9017", "reference_id": "RHSA-2024:9017", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9017" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9018", "reference_id": "RHSA-2024:9018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9019", "reference_id": "RHSA-2024:9019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9552", "reference_id": "RHSA-2024:9552", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9552" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9554", "reference_id": "RHSA-2024:9554", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9554" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1913000", "reference_id": "show_bug.cgi?id=1913000", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:48:10Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1913000" }, { "reference_url": "https://usn.ubuntu.com/7086-1/", "reference_id": "USN-7086-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7086-1/" }, { "reference_url": "https://usn.ubuntu.com/7991-1/", "reference_id": "USN-7991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-10464" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ds2y-kn7q-vuct" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42001?format=api", "vulnerability_id": "VCID-f1zm-g4es-vfbz", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0239.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0239.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0239", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08677", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08546", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08658", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08671", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08694", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.0867", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08596", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08626", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08687", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08534", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0239" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0239", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0239" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2336170", "reference_id": "2336170", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2336170" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-03", "reference_id": "GLSA-202505-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-03" }, { "reference_url": "https://security.gentoo.org/glsa/202509-02", "reference_id": "GLSA-202509-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202509-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-01", "reference_id": "mfsa2025-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-01/", "reference_id": "mfsa2025-01", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:33:42Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-02", "reference_id": "mfsa2025-02", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-02/", "reference_id": "mfsa2025-02", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:33:42Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-04", "reference_id": "mfsa2025-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-04/", "reference_id": "mfsa2025-04", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:33:42Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-04/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-05", "reference_id": "mfsa2025-05", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-05" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-05/", "reference_id": "mfsa2025-05", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:33:42Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-05/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0080", "reference_id": "RHSA-2025:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0132", "reference_id": "RHSA-2025:0132", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0132" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0133", "reference_id": "RHSA-2025:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0134", "reference_id": "RHSA-2025:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0135", "reference_id": "RHSA-2025:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0136", "reference_id": "RHSA-2025:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0137", "reference_id": "RHSA-2025:0137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0138", "reference_id": "RHSA-2025:0138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0144", "reference_id": "RHSA-2025:0144", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0144" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0147", "reference_id": "RHSA-2025:0147", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0147" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0162", "reference_id": "RHSA-2025:0162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0165", "reference_id": "RHSA-2025:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0166", "reference_id": "RHSA-2025:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0167", "reference_id": "RHSA-2025:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0275", "reference_id": "RHSA-2025:0275", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0275" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0281", "reference_id": "RHSA-2025:0281", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0281" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0284", "reference_id": "RHSA-2025:0284", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0284" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0286", "reference_id": "RHSA-2025:0286", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0286" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0287", "reference_id": "RHSA-2025:0287", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0287" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1929156", "reference_id": "show_bug.cgi?id=1929156", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:33:42Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1929156" }, { "reference_url": "https://usn.ubuntu.com/7191-1/", "reference_id": "USN-7191-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7191-1/" }, { "reference_url": "https://usn.ubuntu.com/7991-1/", "reference_id": "USN-7991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2025-0239" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f1zm-g4es-vfbz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41986?format=api", "vulnerability_id": "VCID-grjt-j4at-pqbp", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11692.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11692.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11692", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23632", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.2514", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25042", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25028", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24983", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24914", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25101", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24953", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24961", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24948", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25002", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11692" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11692", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11692" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328946", "reference_id": "2328946", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328946" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-03", "reference_id": "GLSA-202505-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-03" }, { "reference_url": "https://security.gentoo.org/glsa/202509-02", "reference_id": "GLSA-202509-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202509-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:45:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64", "reference_id": "mfsa2024-64", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-64/", "reference_id": "mfsa2024-64", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:45:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-64/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:45:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68", "reference_id": "mfsa2024-68", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-68/", "reference_id": "mfsa2024-68", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:45:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-68/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10591", "reference_id": "RHSA-2024:10591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10592", "reference_id": "RHSA-2024:10592", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10592" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10667", "reference_id": "RHSA-2024:10667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10702", "reference_id": "RHSA-2024:10702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10703", "reference_id": "RHSA-2024:10703", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10703" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10704", "reference_id": "RHSA-2024:10704", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10704" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10710", "reference_id": "RHSA-2024:10710", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10710" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10733", "reference_id": "RHSA-2024:10733", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10733" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10734", "reference_id": "RHSA-2024:10734", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10734" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10742", "reference_id": "RHSA-2024:10742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10743", "reference_id": "RHSA-2024:10743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10745", "reference_id": "RHSA-2024:10745", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10745" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10748", "reference_id": "RHSA-2024:10748", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10748" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10752", "reference_id": "RHSA-2024:10752", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10752" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10844", "reference_id": "RHSA-2024:10844", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10844" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10848", "reference_id": "RHSA-2024:10848", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10848" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10849", "reference_id": "RHSA-2024:10849", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10849" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10880", "reference_id": "RHSA-2024:10880", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10880" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10881", "reference_id": "RHSA-2024:10881", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10881" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909535", "reference_id": "show_bug.cgi?id=1909535", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:45:17Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909535" }, { "reference_url": "https://usn.ubuntu.com/7134-1/", "reference_id": "USN-7134-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7134-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-11692" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-grjt-j4at-pqbp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36151?format=api", "vulnerability_id": "VCID-hfx8-7x82-zqfk", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10466.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10466.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10466", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00669", "scoring_system": "epss", "scoring_elements": "0.71341", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00669", "scoring_system": "epss", "scoring_elements": "0.71362", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00669", "scoring_system": "epss", "scoring_elements": "0.71356", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00669", "scoring_system": "epss", "scoring_elements": "0.71272", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00669", "scoring_system": "epss", "scoring_elements": "0.71306", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00669", "scoring_system": "epss", "scoring_elements": "0.71265", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00669", "scoring_system": "epss", "scoring_elements": "0.7129", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00669", "scoring_system": "epss", "scoring_elements": "0.7131", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00669", "scoring_system": "epss", "scoring_elements": "0.71327", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00669", "scoring_system": "epss", "scoring_elements": "0.71342", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00669", "scoring_system": "epss", "scoring_elements": "0.71319", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10466" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10466", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10466" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322438", "reference_id": "2322438", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322438" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-08", "reference_id": "GLSA-202505-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-55", "reference_id": "mfsa2024-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-55" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", "reference_id": "mfsa2024-55", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:30:57Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-56", "reference_id": "mfsa2024-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-56" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", "reference_id": "mfsa2024-56", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:30:57Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-58", "reference_id": "mfsa2024-58", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-58" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", "reference_id": "mfsa2024-58", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:30:57Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-59", "reference_id": "mfsa2024-59", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-59" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", "reference_id": "mfsa2024-59", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:30:57Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8720", "reference_id": "RHSA-2024:8720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8721", "reference_id": "RHSA-2024:8721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8722", "reference_id": "RHSA-2024:8722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8723", "reference_id": "RHSA-2024:8723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8724", "reference_id": "RHSA-2024:8724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8725", "reference_id": "RHSA-2024:8725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8726", "reference_id": "RHSA-2024:8726", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8726" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8727", "reference_id": "RHSA-2024:8727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8728", "reference_id": "RHSA-2024:8728", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8728" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8729", "reference_id": "RHSA-2024:8729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8790", "reference_id": "RHSA-2024:8790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8793", "reference_id": "RHSA-2024:8793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9015", "reference_id": "RHSA-2024:9015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9016", "reference_id": "RHSA-2024:9016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9017", "reference_id": "RHSA-2024:9017", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9017" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9018", "reference_id": "RHSA-2024:9018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9019", "reference_id": "RHSA-2024:9019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9552", "reference_id": "RHSA-2024:9552", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9552" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9554", "reference_id": "RHSA-2024:9554", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9554" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1924154", "reference_id": "show_bug.cgi?id=1924154", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:30:57Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1924154" }, { "reference_url": "https://usn.ubuntu.com/7086-1/", "reference_id": "USN-7086-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7086-1/" }, { "reference_url": "https://usn.ubuntu.com/7991-1/", "reference_id": "USN-7991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-10466" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hfx8-7x82-zqfk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42000?format=api", "vulnerability_id": "VCID-j5k8-ztxb-uffb", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0238.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0238.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0238", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30485", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32204", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32076", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32042", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32073", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32112", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32108", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32078", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32027", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32165", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32053", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0238" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0238", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0238" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2336165", "reference_id": "2336165", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2336165" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-03", "reference_id": "GLSA-202505-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-03" }, { "reference_url": "https://security.gentoo.org/glsa/202509-02", "reference_id": "GLSA-202509-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202509-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-01", "reference_id": "mfsa2025-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-01/", "reference_id": "mfsa2025-01", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:24:00Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-02", "reference_id": "mfsa2025-02", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-02/", "reference_id": "mfsa2025-02", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:24:00Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-03", "reference_id": "mfsa2025-03", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-03" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-03/", "reference_id": "mfsa2025-03", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:24:00Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-03/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-04", "reference_id": "mfsa2025-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-04/", "reference_id": "mfsa2025-04", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:24:00Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-04/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-05", "reference_id": "mfsa2025-05", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-05" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-05/", "reference_id": "mfsa2025-05", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:24:00Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-05/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0080", "reference_id": "RHSA-2025:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0132", "reference_id": "RHSA-2025:0132", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0132" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0133", "reference_id": "RHSA-2025:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0134", "reference_id": "RHSA-2025:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0135", "reference_id": "RHSA-2025:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0136", "reference_id": "RHSA-2025:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0137", "reference_id": "RHSA-2025:0137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0138", "reference_id": "RHSA-2025:0138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0144", "reference_id": "RHSA-2025:0144", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0144" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0147", "reference_id": "RHSA-2025:0147", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0147" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0162", "reference_id": "RHSA-2025:0162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0165", "reference_id": "RHSA-2025:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0166", "reference_id": "RHSA-2025:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0167", "reference_id": "RHSA-2025:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0275", "reference_id": "RHSA-2025:0275", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0275" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0281", "reference_id": "RHSA-2025:0281", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0281" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0284", "reference_id": "RHSA-2025:0284", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0284" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0286", "reference_id": "RHSA-2025:0286", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0286" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0287", "reference_id": "RHSA-2025:0287", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0287" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1915535", "reference_id": "show_bug.cgi?id=1915535", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:24:00Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1915535" }, { "reference_url": "https://usn.ubuntu.com/7191-1/", "reference_id": "USN-7191-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7191-1/" }, { "reference_url": "https://usn.ubuntu.com/7663-1/", "reference_id": "USN-7663-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7663-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2025-0238" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j5k8-ztxb-uffb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41994?format=api", "vulnerability_id": "VCID-kc7w-zjh4-vqfq", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11701.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11701.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11701", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40461", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40575", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40496", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40546", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40557", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40577", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.4054", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40521", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.4057", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40538", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40547", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11701" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328945", "reference_id": "2328945", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328945" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-03", "reference_id": "GLSA-202505-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-03" }, { "reference_url": "https://security.gentoo.org/glsa/202509-02", "reference_id": "GLSA-202509-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202509-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:41:32Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:41:32Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1914797", "reference_id": "show_bug.cgi?id=1914797", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:41:32Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1914797" }, { "reference_url": "https://usn.ubuntu.com/7134-1/", "reference_id": "USN-7134-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7134-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-11701" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kc7w-zjh4-vqfq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36150?format=api", "vulnerability_id": "VCID-mw96-qtnz-gqdx", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10465.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10465.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10465", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66065", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66077", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66063", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.65994", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.6604", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.6599", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66023", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66028", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66058", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66071", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66052", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10465" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10465", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10465" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322434", "reference_id": "2322434", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322434" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-08", "reference_id": "GLSA-202505-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-55", "reference_id": "mfsa2024-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-55" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", "reference_id": "mfsa2024-55", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:41:01Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-56", "reference_id": "mfsa2024-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-56" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", "reference_id": "mfsa2024-56", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:41:01Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-58", "reference_id": "mfsa2024-58", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-58" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", "reference_id": "mfsa2024-58", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:41:01Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-59", "reference_id": "mfsa2024-59", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-59" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", "reference_id": "mfsa2024-59", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:41:01Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8720", "reference_id": "RHSA-2024:8720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8721", "reference_id": "RHSA-2024:8721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8722", "reference_id": "RHSA-2024:8722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8723", "reference_id": "RHSA-2024:8723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8724", "reference_id": "RHSA-2024:8724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8725", "reference_id": "RHSA-2024:8725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8726", "reference_id": "RHSA-2024:8726", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8726" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8727", "reference_id": "RHSA-2024:8727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8728", "reference_id": "RHSA-2024:8728", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8728" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8729", "reference_id": "RHSA-2024:8729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8790", "reference_id": "RHSA-2024:8790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8793", "reference_id": "RHSA-2024:8793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9015", "reference_id": "RHSA-2024:9015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9016", "reference_id": "RHSA-2024:9016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9017", "reference_id": "RHSA-2024:9017", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9017" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9018", "reference_id": "RHSA-2024:9018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9019", "reference_id": "RHSA-2024:9019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9552", "reference_id": "RHSA-2024:9552", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9552" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9554", "reference_id": "RHSA-2024:9554", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9554" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1918853", "reference_id": "show_bug.cgi?id=1918853", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:41:01Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1918853" }, { "reference_url": "https://usn.ubuntu.com/7086-1/", "reference_id": "USN-7086-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7086-1/" }, { "reference_url": "https://usn.ubuntu.com/7991-1/", "reference_id": "USN-7991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-10465" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mw96-qtnz-gqdx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36143?format=api", "vulnerability_id": "VCID-n4hu-b1t6-xkay", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10458.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10458.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10458", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.6392", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.6391", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63874", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63921", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63856", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63884", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63908", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63841", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63891", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10458" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10458", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10458" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322428", "reference_id": "2322428", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322428" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-08", "reference_id": "GLSA-202505-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-55", "reference_id": "mfsa2024-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-55" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", "reference_id": "mfsa2024-55", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-56", "reference_id": "mfsa2024-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-56" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", "reference_id": "mfsa2024-56", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-57", "reference_id": "mfsa2024-57", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-57" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-57/", "reference_id": "mfsa2024-57", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-57/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-58", "reference_id": "mfsa2024-58", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-58" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", "reference_id": "mfsa2024-58", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-59", "reference_id": "mfsa2024-59", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-59" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", "reference_id": "mfsa2024-59", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8720", "reference_id": "RHSA-2024:8720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8721", "reference_id": "RHSA-2024:8721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8722", "reference_id": "RHSA-2024:8722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8723", "reference_id": "RHSA-2024:8723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8724", "reference_id": "RHSA-2024:8724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8725", "reference_id": "RHSA-2024:8725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8726", "reference_id": "RHSA-2024:8726", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8726" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8727", "reference_id": "RHSA-2024:8727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8728", "reference_id": "RHSA-2024:8728", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8728" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8729", "reference_id": "RHSA-2024:8729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8790", "reference_id": "RHSA-2024:8790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8793", "reference_id": "RHSA-2024:8793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9015", "reference_id": "RHSA-2024:9015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9016", "reference_id": "RHSA-2024:9016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9017", "reference_id": "RHSA-2024:9017", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9017" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9018", "reference_id": "RHSA-2024:9018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9019", "reference_id": "RHSA-2024:9019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9552", "reference_id": "RHSA-2024:9552", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9552" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9554", "reference_id": "RHSA-2024:9554", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9554" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1921733", "reference_id": "show_bug.cgi?id=1921733", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1921733" }, { "reference_url": "https://usn.ubuntu.com/7086-1/", "reference_id": "USN-7086-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7086-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-10458" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n4hu-b1t6-xkay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42003?format=api", "vulnerability_id": "VCID-qtcm-9z3v-dydn", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0241.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0241.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0241", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22547", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2245", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22491", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22472", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22417", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22335", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22504", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22361", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22411", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22413", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22396", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0241" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2336168", "reference_id": "2336168", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2336168" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-03", "reference_id": "GLSA-202505-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-03" }, { "reference_url": "https://security.gentoo.org/glsa/202509-02", "reference_id": "GLSA-202509-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202509-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-01", "reference_id": "mfsa2025-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-01/", "reference_id": "mfsa2025-01", "reference_type": "", "scores": [ { "value": "7.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-08T17:27:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-02", "reference_id": "mfsa2025-02", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-02/", "reference_id": "mfsa2025-02", "reference_type": "", "scores": [ { "value": "7.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-08T17:27:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-04", "reference_id": "mfsa2025-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-04/", "reference_id": "mfsa2025-04", "reference_type": "", "scores": [ { "value": "7.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-08T17:27:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-04/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-05", "reference_id": "mfsa2025-05", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-05" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-05/", "reference_id": "mfsa2025-05", "reference_type": "", "scores": [ { "value": "7.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-08T17:27:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-05/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0080", "reference_id": "RHSA-2025:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0132", "reference_id": "RHSA-2025:0132", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0132" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0133", "reference_id": "RHSA-2025:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0134", "reference_id": "RHSA-2025:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0135", "reference_id": "RHSA-2025:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0136", "reference_id": "RHSA-2025:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0137", "reference_id": "RHSA-2025:0137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0138", "reference_id": "RHSA-2025:0138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0144", "reference_id": "RHSA-2025:0144", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0144" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0147", "reference_id": "RHSA-2025:0147", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0147" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0162", "reference_id": "RHSA-2025:0162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0165", "reference_id": "RHSA-2025:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0166", "reference_id": "RHSA-2025:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0167", "reference_id": "RHSA-2025:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0275", "reference_id": "RHSA-2025:0275", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0275" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0281", "reference_id": "RHSA-2025:0281", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0281" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0284", "reference_id": "RHSA-2025:0284", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0284" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0286", "reference_id": "RHSA-2025:0286", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0286" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0287", "reference_id": "RHSA-2025:0287", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0287" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1933023", "reference_id": "show_bug.cgi?id=1933023", "reference_type": "", "scores": [ { "value": "7.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-08T17:27:29Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1933023" }, { "reference_url": "https://usn.ubuntu.com/7191-1/", "reference_id": "USN-7191-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7191-1/" }, { "reference_url": "https://usn.ubuntu.com/7991-1/", "reference_id": "USN-7991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2025-0241" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qtcm-9z3v-dydn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41993?format=api", "vulnerability_id": "VCID-qzb8-5u9j-27g1", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11700.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11700.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11700", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41568", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41582", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41615", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41594", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41585", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41535", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.4158", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41608", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50151", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50177", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11700" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328938", "reference_id": "2328938", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328938" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-03", "reference_id": "GLSA-202505-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-03" }, { "reference_url": "https://security.gentoo.org/glsa/202509-02", "reference_id": "GLSA-202509-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202509-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:50:18Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:50:18Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1836921", "reference_id": "show_bug.cgi?id=1836921", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:50:18Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1836921" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-11700" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qzb8-5u9j-27g1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41999?format=api", "vulnerability_id": "VCID-r7ss-g876-c7fg", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0237.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0237.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0237", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28036", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.31026", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30848", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30893", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30935", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30933", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30903", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30845", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30979", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30859", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30879", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0237" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0237", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0237" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2336182", "reference_id": "2336182", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2336182" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-03", "reference_id": "GLSA-202505-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-03" }, { "reference_url": "https://security.gentoo.org/glsa/202509-02", "reference_id": "GLSA-202509-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202509-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-01", "reference_id": "mfsa2025-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-01/", "reference_id": "mfsa2025-01", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T15:57:56Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-02", "reference_id": "mfsa2025-02", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-02/", "reference_id": "mfsa2025-02", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T15:57:56Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-04", "reference_id": "mfsa2025-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-04/", "reference_id": "mfsa2025-04", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T15:57:56Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-04/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-05", "reference_id": "mfsa2025-05", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-05" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-05/", "reference_id": "mfsa2025-05", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T15:57:56Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-05/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0080", "reference_id": "RHSA-2025:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0132", "reference_id": "RHSA-2025:0132", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0132" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0133", "reference_id": "RHSA-2025:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0134", "reference_id": "RHSA-2025:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0135", "reference_id": "RHSA-2025:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0136", "reference_id": "RHSA-2025:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0137", "reference_id": "RHSA-2025:0137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0138", "reference_id": "RHSA-2025:0138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0144", "reference_id": "RHSA-2025:0144", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0144" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0147", "reference_id": "RHSA-2025:0147", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0147" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0162", "reference_id": "RHSA-2025:0162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0165", "reference_id": "RHSA-2025:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0166", "reference_id": "RHSA-2025:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0167", "reference_id": "RHSA-2025:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0275", "reference_id": "RHSA-2025:0275", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0275" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0281", "reference_id": "RHSA-2025:0281", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0281" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0284", "reference_id": "RHSA-2025:0284", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0284" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0286", "reference_id": "RHSA-2025:0286", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0286" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0287", "reference_id": "RHSA-2025:0287", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0287" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1915257", "reference_id": "show_bug.cgi?id=1915257", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T15:57:56Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1915257" }, { "reference_url": "https://usn.ubuntu.com/7191-1/", "reference_id": "USN-7191-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7191-1/" }, { "reference_url": "https://usn.ubuntu.com/7991-1/", "reference_id": "USN-7991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2025-0237" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r7ss-g876-c7fg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36148?format=api", "vulnerability_id": "VCID-rcg4-7hjg-v7du", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10463.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10463.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10463", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64514", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64522", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.6451", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64476", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64477", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64436", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64447", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64516", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64501", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64484", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10463" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10463", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10463" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322439", "reference_id": "2322439", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322439" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-08", "reference_id": "GLSA-202505-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-55", "reference_id": "mfsa2024-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-55" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", "reference_id": "mfsa2024-55", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-56", "reference_id": "mfsa2024-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-56" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", "reference_id": "mfsa2024-56", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-57", "reference_id": "mfsa2024-57", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-57" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-57/", "reference_id": "mfsa2024-57", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-57/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-58", "reference_id": "mfsa2024-58", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-58" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", "reference_id": "mfsa2024-58", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-59", "reference_id": "mfsa2024-59", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-59" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", "reference_id": "mfsa2024-59", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8720", "reference_id": "RHSA-2024:8720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8721", "reference_id": "RHSA-2024:8721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8722", "reference_id": "RHSA-2024:8722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8723", "reference_id": "RHSA-2024:8723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8724", "reference_id": "RHSA-2024:8724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8725", "reference_id": "RHSA-2024:8725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8726", "reference_id": "RHSA-2024:8726", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8726" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8727", "reference_id": "RHSA-2024:8727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8728", "reference_id": "RHSA-2024:8728", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8728" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8729", "reference_id": "RHSA-2024:8729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8790", "reference_id": "RHSA-2024:8790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8793", "reference_id": "RHSA-2024:8793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9015", "reference_id": "RHSA-2024:9015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9016", "reference_id": "RHSA-2024:9016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9017", "reference_id": "RHSA-2024:9017", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9017" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9018", "reference_id": "RHSA-2024:9018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9019", "reference_id": "RHSA-2024:9019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9552", "reference_id": "RHSA-2024:9552", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9552" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9554", "reference_id": "RHSA-2024:9554", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9554" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1920800", "reference_id": "show_bug.cgi?id=1920800", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1920800" }, { "reference_url": "https://usn.ubuntu.com/7086-1/", "reference_id": "USN-7086-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7086-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-10463" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rcg4-7hjg-v7du" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36146?format=api", "vulnerability_id": "VCID-sg2y-gfue-6qam", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10461.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10461.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10461", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00944", "scoring_system": "epss", "scoring_elements": "0.76335", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00944", "scoring_system": "epss", "scoring_elements": "0.7635", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00944", "scoring_system": "epss", "scoring_elements": "0.76345", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00944", "scoring_system": "epss", "scoring_elements": "0.76248", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00944", "scoring_system": "epss", "scoring_elements": "0.76291", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00944", "scoring_system": "epss", "scoring_elements": "0.76259", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00944", "scoring_system": "epss", "scoring_elements": "0.76278", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00944", "scoring_system": "epss", "scoring_elements": "0.76309", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00944", "scoring_system": "epss", "scoring_elements": "0.76331", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00944", "scoring_system": "epss", "scoring_elements": "0.76305", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10461" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10461", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10461" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322425", "reference_id": "2322425", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322425" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-08", "reference_id": "GLSA-202505-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-55", "reference_id": "mfsa2024-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-55" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", "reference_id": "mfsa2024-55", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:04:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-56", "reference_id": "mfsa2024-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-56" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", "reference_id": "mfsa2024-56", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:04:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-58", "reference_id": "mfsa2024-58", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-58" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", "reference_id": "mfsa2024-58", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:04:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-59", "reference_id": "mfsa2024-59", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-59" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", "reference_id": "mfsa2024-59", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:04:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8720", "reference_id": "RHSA-2024:8720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8721", "reference_id": "RHSA-2024:8721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8722", "reference_id": "RHSA-2024:8722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8723", "reference_id": "RHSA-2024:8723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8724", "reference_id": "RHSA-2024:8724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8725", "reference_id": "RHSA-2024:8725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8726", "reference_id": "RHSA-2024:8726", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8726" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8727", "reference_id": "RHSA-2024:8727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8728", "reference_id": "RHSA-2024:8728", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8728" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8729", "reference_id": "RHSA-2024:8729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8790", "reference_id": "RHSA-2024:8790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8793", "reference_id": "RHSA-2024:8793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9015", "reference_id": "RHSA-2024:9015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9016", "reference_id": "RHSA-2024:9016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9017", "reference_id": "RHSA-2024:9017", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9017" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9018", "reference_id": "RHSA-2024:9018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9019", "reference_id": "RHSA-2024:9019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9552", "reference_id": "RHSA-2024:9552", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9552" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9554", "reference_id": "RHSA-2024:9554", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9554" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1914521", "reference_id": "show_bug.cgi?id=1914521", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:04:49Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1914521" }, { "reference_url": "https://usn.ubuntu.com/7086-1/", "reference_id": "USN-7086-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7086-1/" }, { "reference_url": "https://usn.ubuntu.com/7991-1/", "reference_id": "USN-7991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-10461" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sg2y-gfue-6qam" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42002?format=api", "vulnerability_id": "VCID-tgpf-32kg-rqc2", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0240.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0240.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0240", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14997", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14809", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14868", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14906", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14941", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.1489", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.148", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.1492", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14773", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14714", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14706", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0240" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0240", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0240" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2336188", "reference_id": "2336188", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2336188" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-03", "reference_id": "GLSA-202505-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-03" }, { "reference_url": "https://security.gentoo.org/glsa/202509-02", "reference_id": "GLSA-202509-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202509-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-01", "reference_id": "mfsa2025-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-01/", "reference_id": "mfsa2025-01", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:36:55Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-02", "reference_id": "mfsa2025-02", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-02/", "reference_id": "mfsa2025-02", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:36:55Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-04", "reference_id": "mfsa2025-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-04/", "reference_id": "mfsa2025-04", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:36:55Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-04/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-05", "reference_id": "mfsa2025-05", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-05" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-05/", "reference_id": "mfsa2025-05", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:36:55Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-05/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0080", "reference_id": "RHSA-2025:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0132", "reference_id": "RHSA-2025:0132", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0132" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0133", "reference_id": "RHSA-2025:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0134", "reference_id": "RHSA-2025:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0135", "reference_id": "RHSA-2025:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0136", "reference_id": "RHSA-2025:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0137", "reference_id": "RHSA-2025:0137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0138", "reference_id": "RHSA-2025:0138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0144", "reference_id": "RHSA-2025:0144", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0144" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0147", "reference_id": "RHSA-2025:0147", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0147" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0162", "reference_id": "RHSA-2025:0162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0165", "reference_id": "RHSA-2025:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0166", "reference_id": "RHSA-2025:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0167", "reference_id": "RHSA-2025:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0275", "reference_id": "RHSA-2025:0275", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0275" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0281", "reference_id": "RHSA-2025:0281", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0281" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0284", "reference_id": "RHSA-2025:0284", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0284" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0286", "reference_id": "RHSA-2025:0286", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0286" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0287", "reference_id": "RHSA-2025:0287", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0287" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1929623", "reference_id": "show_bug.cgi?id=1929623", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:36:55Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1929623" }, { "reference_url": "https://usn.ubuntu.com/7191-1/", "reference_id": "USN-7191-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7191-1/" }, { "reference_url": "https://usn.ubuntu.com/7991-1/", "reference_id": "USN-7991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2025-0240" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tgpf-32kg-rqc2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42005?format=api", "vulnerability_id": "VCID-ukf2-qcjg-u7bg", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0243.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0243.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0243", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08516", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08488", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08503", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08521", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08527", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08508", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08435", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.0846", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08363", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08379", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0243" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0243", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0243" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2336175", "reference_id": "2336175", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2336175" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1827142%2C1932783", "reference_id": "buglist.cgi?bug_id=1827142%2C1932783", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T16:44:56Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1827142%2C1932783" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-03", "reference_id": "GLSA-202505-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-03" }, { "reference_url": "https://security.gentoo.org/glsa/202509-02", "reference_id": "GLSA-202509-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202509-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-01", "reference_id": "mfsa2025-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-01/", "reference_id": "mfsa2025-01", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T16:44:56Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-02", "reference_id": "mfsa2025-02", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-02/", "reference_id": "mfsa2025-02", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T16:44:56Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-04", "reference_id": "mfsa2025-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-04/", "reference_id": "mfsa2025-04", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T16:44:56Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-04/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-05", "reference_id": "mfsa2025-05", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-05" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2025-05/", "reference_id": "mfsa2025-05", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T16:44:56Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2025-05/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0080", "reference_id": "RHSA-2025:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0132", "reference_id": "RHSA-2025:0132", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0132" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0133", "reference_id": "RHSA-2025:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0134", "reference_id": "RHSA-2025:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0135", "reference_id": "RHSA-2025:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0136", "reference_id": "RHSA-2025:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0137", "reference_id": "RHSA-2025:0137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0138", "reference_id": "RHSA-2025:0138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0144", "reference_id": "RHSA-2025:0144", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0144" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0147", "reference_id": "RHSA-2025:0147", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0147" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0162", "reference_id": "RHSA-2025:0162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0165", "reference_id": "RHSA-2025:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0166", "reference_id": "RHSA-2025:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0167", "reference_id": "RHSA-2025:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0275", "reference_id": "RHSA-2025:0275", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0275" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0281", "reference_id": "RHSA-2025:0281", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0281" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0284", "reference_id": "RHSA-2025:0284", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0284" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0286", "reference_id": "RHSA-2025:0286", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0286" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0287", "reference_id": "RHSA-2025:0287", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0287" }, { "reference_url": "https://usn.ubuntu.com/7191-1/", "reference_id": "USN-7191-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7191-1/" }, { "reference_url": "https://usn.ubuntu.com/7991-1/", "reference_id": "USN-7991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2025-0243" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ukf2-qcjg-u7bg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36152?format=api", "vulnerability_id": "VCID-vdpy-f9d9-pfac", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10467.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10467.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10467", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67346", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67368", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67321", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67356", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67369", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67282", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67305", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67348", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67283", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67334", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10467" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10467", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10467" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322433", "reference_id": "2322433", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322433" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1829029%2C1888538%2C1900394%2C1904059%2C1917742%2C1919809%2C1923706", "reference_id": "buglist.cgi?bug_id=1829029%2C1888538%2C1900394%2C1904059%2C1917742%2C1919809%2C1923706", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:23:47Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1829029%2C1888538%2C1900394%2C1904059%2C1917742%2C1919809%2C1923706" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-08", "reference_id": "GLSA-202505-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-55", "reference_id": "mfsa2024-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-55" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", "reference_id": "mfsa2024-55", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:23:47Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-56", "reference_id": "mfsa2024-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-56" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", "reference_id": "mfsa2024-56", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:23:47Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-58", "reference_id": "mfsa2024-58", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-58" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", "reference_id": "mfsa2024-58", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:23:47Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-59", "reference_id": "mfsa2024-59", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-59" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", "reference_id": "mfsa2024-59", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:23:47Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8720", "reference_id": "RHSA-2024:8720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8721", "reference_id": "RHSA-2024:8721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8722", "reference_id": "RHSA-2024:8722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8723", "reference_id": "RHSA-2024:8723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8724", "reference_id": "RHSA-2024:8724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8725", "reference_id": "RHSA-2024:8725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8726", "reference_id": "RHSA-2024:8726", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8726" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8727", "reference_id": "RHSA-2024:8727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8728", "reference_id": "RHSA-2024:8728", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8728" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8729", "reference_id": "RHSA-2024:8729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8790", "reference_id": "RHSA-2024:8790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8793", "reference_id": "RHSA-2024:8793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9015", "reference_id": "RHSA-2024:9015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9016", "reference_id": "RHSA-2024:9016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9017", "reference_id": "RHSA-2024:9017", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9017" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9018", "reference_id": "RHSA-2024:9018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9019", "reference_id": "RHSA-2024:9019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9552", "reference_id": "RHSA-2024:9552", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9552" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9554", "reference_id": "RHSA-2024:9554", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9554" }, { "reference_url": "https://usn.ubuntu.com/7086-1/", "reference_id": "USN-7086-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7086-1/" }, { "reference_url": "https://usn.ubuntu.com/7991-1/", "reference_id": "USN-7991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-10467" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vdpy-f9d9-pfac" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41992?format=api", "vulnerability_id": "VCID-w7gj-shrq-3fcz", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11699.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11699.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11699", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26272", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26104", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26163", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26208", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26201", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26152", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26085", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26313", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26109", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30486", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32054", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11699" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11699", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11699" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328947", "reference_id": "2328947", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328947" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1880582%2C1929911", "reference_id": "buglist.cgi?bug_id=1880582%2C1929911", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:00:52Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1880582%2C1929911" }, { "reference_url": "https://security.gentoo.org/glsa/202501-10", "reference_id": "GLSA-202501-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-10" }, { "reference_url": "https://security.gentoo.org/glsa/202505-03", "reference_id": "GLSA-202505-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-03" }, { "reference_url": "https://security.gentoo.org/glsa/202509-02", "reference_id": "GLSA-202509-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202509-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", "reference_id": "mfsa2024-63", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:00:52Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64", "reference_id": "mfsa2024-64", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-64/", "reference_id": "mfsa2024-64", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:00:52Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-64/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", "reference_id": "mfsa2024-67", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:00:52Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68", "reference_id": "mfsa2024-68", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-68/", "reference_id": "mfsa2024-68", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:00:52Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-68/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10591", "reference_id": "RHSA-2024:10591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10592", "reference_id": "RHSA-2024:10592", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10592" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10667", "reference_id": "RHSA-2024:10667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10702", "reference_id": "RHSA-2024:10702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10703", "reference_id": "RHSA-2024:10703", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10703" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10704", "reference_id": "RHSA-2024:10704", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10704" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10710", "reference_id": "RHSA-2024:10710", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10710" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10733", "reference_id": "RHSA-2024:10733", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10733" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10734", "reference_id": "RHSA-2024:10734", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10734" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10742", "reference_id": "RHSA-2024:10742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10743", "reference_id": "RHSA-2024:10743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10745", "reference_id": "RHSA-2024:10745", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10745" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10748", "reference_id": "RHSA-2024:10748", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10748" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10752", "reference_id": "RHSA-2024:10752", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10752" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10844", "reference_id": "RHSA-2024:10844", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10844" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10848", "reference_id": "RHSA-2024:10848", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10848" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10849", "reference_id": "RHSA-2024:10849", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10849" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10880", "reference_id": "RHSA-2024:10880", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10880" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10881", "reference_id": "RHSA-2024:10881", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10881" }, { "reference_url": "https://usn.ubuntu.com/7134-1/", "reference_id": "USN-7134-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7134-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75874?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@128.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@128.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/75875?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@134.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" } ], "aliases": [ "CVE-2024-11699" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w7gj-shrq-3fcz" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@134.0" }