Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-lang/spidermonkey@128.8.0
Typeebuild
Namespacedev-lang
Namespidermonkey
Version128.8.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version128.9.0
Latest_non_vulnerable_version128.9.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-18my-61hh-n3gb
vulnerability_id VCID-18my-61hh-n3gb
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1934.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1934.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1934
reference_id
reference_type
scores
0
value 0.00283
scoring_system epss
scoring_elements 0.51739
published_at 2026-04-13T12:55:00Z
1
value 0.00283
scoring_system epss
scoring_elements 0.51786
published_at 2026-04-18T12:55:00Z
2
value 0.00283
scoring_system epss
scoring_elements 0.51755
published_at 2026-04-12T12:55:00Z
3
value 0.00283
scoring_system epss
scoring_elements 0.51779
published_at 2026-04-16T12:55:00Z
4
value 0.00323
scoring_system epss
scoring_elements 0.55374
published_at 2026-04-04T12:55:00Z
5
value 0.00323
scoring_system epss
scoring_elements 0.55349
published_at 2026-04-02T12:55:00Z
6
value 0.00323
scoring_system epss
scoring_elements 0.55414
published_at 2026-04-11T12:55:00Z
7
value 0.00323
scoring_system epss
scoring_elements 0.55403
published_at 2026-04-09T12:55:00Z
8
value 0.00323
scoring_system epss
scoring_elements 0.55352
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1934
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1934
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2349790
reference_id 2349790
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2349790
5
reference_url https://security.gentoo.org/glsa/202505-02
reference_id GLSA-202505-02
reference_type
scores
url https://security.gentoo.org/glsa/202505-02
6
reference_url https://security.gentoo.org/glsa/202505-03
reference_id GLSA-202505-03
reference_type
scores
url https://security.gentoo.org/glsa/202505-03
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-14
reference_id mfsa2025-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-14
9
reference_url https://www.mozilla.org/security/advisories/mfsa2025-14/
reference_id mfsa2025-14
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-04T15:50:25Z/
url https://www.mozilla.org/security/advisories/mfsa2025-14/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-16
reference_id mfsa2025-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-16
11
reference_url https://www.mozilla.org/security/advisories/mfsa2025-16/
reference_id mfsa2025-16
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-04T15:50:25Z/
url https://www.mozilla.org/security/advisories/mfsa2025-16/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-17
reference_id mfsa2025-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-17
13
reference_url https://www.mozilla.org/security/advisories/mfsa2025-17/
reference_id mfsa2025-17
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-04T15:50:25Z/
url https://www.mozilla.org/security/advisories/mfsa2025-17/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-18
reference_id mfsa2025-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-18
15
reference_url https://www.mozilla.org/security/advisories/mfsa2025-18/
reference_id mfsa2025-18
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-04T15:50:25Z/
url https://www.mozilla.org/security/advisories/mfsa2025-18/
16
reference_url https://access.redhat.com/errata/RHSA-2025:2359
reference_id RHSA-2025:2359
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2359
17
reference_url https://access.redhat.com/errata/RHSA-2025:2452
reference_id RHSA-2025:2452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2452
18
reference_url https://access.redhat.com/errata/RHSA-2025:2479
reference_id RHSA-2025:2479
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2479
19
reference_url https://access.redhat.com/errata/RHSA-2025:2480
reference_id RHSA-2025:2480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2480
20
reference_url https://access.redhat.com/errata/RHSA-2025:2481
reference_id RHSA-2025:2481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2481
21
reference_url https://access.redhat.com/errata/RHSA-2025:2484
reference_id RHSA-2025:2484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2484
22
reference_url https://access.redhat.com/errata/RHSA-2025:2485
reference_id RHSA-2025:2485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2485
23
reference_url https://access.redhat.com/errata/RHSA-2025:2486
reference_id RHSA-2025:2486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2486
24
reference_url https://access.redhat.com/errata/RHSA-2025:2699
reference_id RHSA-2025:2699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2699
25
reference_url https://access.redhat.com/errata/RHSA-2025:2708
reference_id RHSA-2025:2708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2708
26
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1942881
reference_id show_bug.cgi?id=1942881
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-04T15:50:25Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1942881
27
reference_url https://usn.ubuntu.com/7334-1/
reference_id USN-7334-1
reference_type
scores
url https://usn.ubuntu.com/7334-1/
28
reference_url https://usn.ubuntu.com/7663-1/
reference_id USN-7663-1
reference_type
scores
url https://usn.ubuntu.com/7663-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2025-1934
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-18my-61hh-n3gb
1
url VCID-19vv-zhum-43hp
vulnerability_id VCID-19vv-zhum-43hp
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10468.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10468.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10468
reference_id
reference_type
scores
0
value 0.00271
scoring_system epss
scoring_elements 0.50563
published_at 2026-04-21T12:55:00Z
1
value 0.00271
scoring_system epss
scoring_elements 0.5053
published_at 2026-04-04T12:55:00Z
2
value 0.00271
scoring_system epss
scoring_elements 0.50484
published_at 2026-04-07T12:55:00Z
3
value 0.00271
scoring_system epss
scoring_elements 0.50538
published_at 2026-04-08T12:55:00Z
4
value 0.00271
scoring_system epss
scoring_elements 0.50535
published_at 2026-04-09T12:55:00Z
5
value 0.00271
scoring_system epss
scoring_elements 0.50577
published_at 2026-04-11T12:55:00Z
6
value 0.00271
scoring_system epss
scoring_elements 0.50553
published_at 2026-04-12T12:55:00Z
7
value 0.00271
scoring_system epss
scoring_elements 0.50539
published_at 2026-04-13T12:55:00Z
8
value 0.00271
scoring_system epss
scoring_elements 0.50581
published_at 2026-04-16T12:55:00Z
9
value 0.00271
scoring_system epss
scoring_elements 0.50586
published_at 2026-04-18T12:55:00Z
10
value 0.00271
scoring_system epss
scoring_elements 0.50503
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10468
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322443
reference_id 2322443
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322443
4
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
5
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
reference_id mfsa2024-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-55/
reference_id mfsa2024-55
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:16:38Z/
url https://www.mozilla.org/security/advisories/mfsa2024-55/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
reference_id mfsa2024-59
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-59/
reference_id mfsa2024-59
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:16:38Z/
url https://www.mozilla.org/security/advisories/mfsa2024-59/
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1914982
reference_id show_bug.cgi?id=1914982
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:16:38Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1914982
12
reference_url https://usn.ubuntu.com/7086-1/
reference_id USN-7086-1
reference_type
scores
url https://usn.ubuntu.com/7086-1/
13
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-10468
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-19vv-zhum-43hp
2
url VCID-1z5d-4wfm-8yfk
vulnerability_id VCID-1z5d-4wfm-8yfk
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9396.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9396.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9396
reference_id
reference_type
scores
0
value 0.00179
scoring_system epss
scoring_elements 0.39475
published_at 2026-04-21T12:55:00Z
1
value 0.00179
scoring_system epss
scoring_elements 0.39559
published_at 2026-04-18T12:55:00Z
2
value 0.00179
scoring_system epss
scoring_elements 0.39589
published_at 2026-04-16T12:55:00Z
3
value 0.00179
scoring_system epss
scoring_elements 0.39574
published_at 2026-04-02T12:55:00Z
4
value 0.00179
scoring_system epss
scoring_elements 0.39567
published_at 2026-04-08T12:55:00Z
5
value 0.00179
scoring_system epss
scoring_elements 0.39513
published_at 2026-04-07T12:55:00Z
6
value 0.00179
scoring_system epss
scoring_elements 0.39597
published_at 2026-04-04T12:55:00Z
7
value 0.00179
scoring_system epss
scoring_elements 0.39539
published_at 2026-04-13T12:55:00Z
8
value 0.00179
scoring_system epss
scoring_elements 0.39555
published_at 2026-04-12T12:55:00Z
9
value 0.00179
scoring_system epss
scoring_elements 0.39593
published_at 2026-04-11T12:55:00Z
10
value 0.00179
scoring_system epss
scoring_elements 0.39583
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9396
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315954
reference_id 2315954
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315954
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:12:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:12:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:12:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:12:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
15
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
16
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
17
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
18
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
19
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
20
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
21
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
22
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
23
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
24
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
25
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
26
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
27
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
28
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
29
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
30
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
31
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1912471
reference_id show_bug.cgi?id=1912471
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:12:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1912471
32
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
33
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-9396
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1z5d-4wfm-8yfk
3
url VCID-6bbw-b3rx-a7hj
vulnerability_id VCID-6bbw-b3rx-a7hj
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10462.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10462.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10462
reference_id
reference_type
scores
0
value 0.00502
scoring_system epss
scoring_elements 0.66065
published_at 2026-04-21T12:55:00Z
1
value 0.00502
scoring_system epss
scoring_elements 0.66077
published_at 2026-04-18T12:55:00Z
2
value 0.00502
scoring_system epss
scoring_elements 0.66063
published_at 2026-04-16T12:55:00Z
3
value 0.00502
scoring_system epss
scoring_elements 0.66028
published_at 2026-04-13T12:55:00Z
4
value 0.00502
scoring_system epss
scoring_elements 0.66058
published_at 2026-04-12T12:55:00Z
5
value 0.00502
scoring_system epss
scoring_elements 0.66071
published_at 2026-04-11T12:55:00Z
6
value 0.00502
scoring_system epss
scoring_elements 0.66052
published_at 2026-04-09T12:55:00Z
7
value 0.00502
scoring_system epss
scoring_elements 0.65994
published_at 2026-04-02T12:55:00Z
8
value 0.00502
scoring_system epss
scoring_elements 0.6604
published_at 2026-04-08T12:55:00Z
9
value 0.00502
scoring_system epss
scoring_elements 0.6599
published_at 2026-04-07T12:55:00Z
10
value 0.00502
scoring_system epss
scoring_elements 0.66023
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10462
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10462
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322440
reference_id 2322440
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322440
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
reference_id mfsa2024-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-55/
reference_id mfsa2024-55
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T15:00:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-55/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
reference_id mfsa2024-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-56/
reference_id mfsa2024-56
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T15:00:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-56/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
reference_id mfsa2024-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-58/
reference_id mfsa2024-58
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T15:00:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-58/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
reference_id mfsa2024-59
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-59/
reference_id mfsa2024-59
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T15:00:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-59/
16
reference_url https://access.redhat.com/errata/RHSA-2024:8720
reference_id RHSA-2024:8720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8720
17
reference_url https://access.redhat.com/errata/RHSA-2024:8721
reference_id RHSA-2024:8721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8721
18
reference_url https://access.redhat.com/errata/RHSA-2024:8722
reference_id RHSA-2024:8722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8722
19
reference_url https://access.redhat.com/errata/RHSA-2024:8723
reference_id RHSA-2024:8723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8723
20
reference_url https://access.redhat.com/errata/RHSA-2024:8724
reference_id RHSA-2024:8724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8724
21
reference_url https://access.redhat.com/errata/RHSA-2024:8725
reference_id RHSA-2024:8725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8725
22
reference_url https://access.redhat.com/errata/RHSA-2024:8726
reference_id RHSA-2024:8726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8726
23
reference_url https://access.redhat.com/errata/RHSA-2024:8727
reference_id RHSA-2024:8727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8727
24
reference_url https://access.redhat.com/errata/RHSA-2024:8728
reference_id RHSA-2024:8728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8728
25
reference_url https://access.redhat.com/errata/RHSA-2024:8729
reference_id RHSA-2024:8729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8729
26
reference_url https://access.redhat.com/errata/RHSA-2024:8790
reference_id RHSA-2024:8790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8790
27
reference_url https://access.redhat.com/errata/RHSA-2024:8793
reference_id RHSA-2024:8793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8793
28
reference_url https://access.redhat.com/errata/RHSA-2024:9015
reference_id RHSA-2024:9015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9015
29
reference_url https://access.redhat.com/errata/RHSA-2024:9016
reference_id RHSA-2024:9016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9016
30
reference_url https://access.redhat.com/errata/RHSA-2024:9017
reference_id RHSA-2024:9017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9017
31
reference_url https://access.redhat.com/errata/RHSA-2024:9018
reference_id RHSA-2024:9018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9018
32
reference_url https://access.redhat.com/errata/RHSA-2024:9019
reference_id RHSA-2024:9019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9019
33
reference_url https://access.redhat.com/errata/RHSA-2024:9552
reference_id RHSA-2024:9552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9552
34
reference_url https://access.redhat.com/errata/RHSA-2024:9554
reference_id RHSA-2024:9554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9554
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1920423
reference_id show_bug.cgi?id=1920423
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T15:00:03Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1920423
36
reference_url https://usn.ubuntu.com/7086-1/
reference_id USN-7086-1
reference_type
scores
url https://usn.ubuntu.com/7086-1/
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-10462
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6bbw-b3rx-a7hj
4
url VCID-7eu3-hxbk-8fd7
vulnerability_id VCID-7eu3-hxbk-8fd7
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1935.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1935.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1935
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.40718
published_at 2026-04-13T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40734
published_at 2026-04-18T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40736
published_at 2026-04-12T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40763
published_at 2026-04-16T12:55:00Z
4
value 0.00298
scoring_system epss
scoring_elements 0.53181
published_at 2026-04-04T12:55:00Z
5
value 0.00298
scoring_system epss
scoring_elements 0.53158
published_at 2026-04-02T12:55:00Z
6
value 0.00298
scoring_system epss
scoring_elements 0.53249
published_at 2026-04-11T12:55:00Z
7
value 0.00298
scoring_system epss
scoring_elements 0.53198
published_at 2026-04-09T12:55:00Z
8
value 0.00298
scoring_system epss
scoring_elements 0.53204
published_at 2026-04-08T12:55:00Z
9
value 0.00298
scoring_system epss
scoring_elements 0.53151
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1935
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1935
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2349792
reference_id 2349792
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2349792
5
reference_url https://security.gentoo.org/glsa/202505-02
reference_id GLSA-202505-02
reference_type
scores
url https://security.gentoo.org/glsa/202505-02
6
reference_url https://security.gentoo.org/glsa/202505-03
reference_id GLSA-202505-03
reference_type
scores
url https://security.gentoo.org/glsa/202505-03
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-14
reference_id mfsa2025-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-14
9
reference_url https://www.mozilla.org/security/advisories/mfsa2025-14/
reference_id mfsa2025-14
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-04T15:40:29Z/
url https://www.mozilla.org/security/advisories/mfsa2025-14/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-16
reference_id mfsa2025-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-16
11
reference_url https://www.mozilla.org/security/advisories/mfsa2025-16/
reference_id mfsa2025-16
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-04T15:40:29Z/
url https://www.mozilla.org/security/advisories/mfsa2025-16/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-17
reference_id mfsa2025-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-17
13
reference_url https://www.mozilla.org/security/advisories/mfsa2025-17/
reference_id mfsa2025-17
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-04T15:40:29Z/
url https://www.mozilla.org/security/advisories/mfsa2025-17/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-18
reference_id mfsa2025-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-18
15
reference_url https://www.mozilla.org/security/advisories/mfsa2025-18/
reference_id mfsa2025-18
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-04T15:40:29Z/
url https://www.mozilla.org/security/advisories/mfsa2025-18/
16
reference_url https://access.redhat.com/errata/RHSA-2025:2359
reference_id RHSA-2025:2359
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2359
17
reference_url https://access.redhat.com/errata/RHSA-2025:2452
reference_id RHSA-2025:2452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2452
18
reference_url https://access.redhat.com/errata/RHSA-2025:2479
reference_id RHSA-2025:2479
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2479
19
reference_url https://access.redhat.com/errata/RHSA-2025:2480
reference_id RHSA-2025:2480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2480
20
reference_url https://access.redhat.com/errata/RHSA-2025:2481
reference_id RHSA-2025:2481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2481
21
reference_url https://access.redhat.com/errata/RHSA-2025:2484
reference_id RHSA-2025:2484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2484
22
reference_url https://access.redhat.com/errata/RHSA-2025:2485
reference_id RHSA-2025:2485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2485
23
reference_url https://access.redhat.com/errata/RHSA-2025:2486
reference_id RHSA-2025:2486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2486
24
reference_url https://access.redhat.com/errata/RHSA-2025:2699
reference_id RHSA-2025:2699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2699
25
reference_url https://access.redhat.com/errata/RHSA-2025:2708
reference_id RHSA-2025:2708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2708
26
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1866661
reference_id show_bug.cgi?id=1866661
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-04T15:40:29Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1866661
27
reference_url https://usn.ubuntu.com/7334-1/
reference_id USN-7334-1
reference_type
scores
url https://usn.ubuntu.com/7334-1/
28
reference_url https://usn.ubuntu.com/7663-1/
reference_id USN-7663-1
reference_type
scores
url https://usn.ubuntu.com/7663-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2025-1935
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7eu3-hxbk-8fd7
5
url VCID-95vw-esba-23a2
vulnerability_id VCID-95vw-esba-23a2
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1937.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1937.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1937
reference_id
reference_type
scores
0
value 0.00213
scoring_system epss
scoring_elements 0.43889
published_at 2026-04-18T12:55:00Z
1
value 0.00213
scoring_system epss
scoring_elements 0.43852
published_at 2026-04-12T12:55:00Z
2
value 0.00213
scoring_system epss
scoring_elements 0.43835
published_at 2026-04-13T12:55:00Z
3
value 0.00213
scoring_system epss
scoring_elements 0.43897
published_at 2026-04-16T12:55:00Z
4
value 0.00259
scoring_system epss
scoring_elements 0.49241
published_at 2026-04-04T12:55:00Z
5
value 0.00259
scoring_system epss
scoring_elements 0.49213
published_at 2026-04-02T12:55:00Z
6
value 0.00259
scoring_system epss
scoring_elements 0.49262
published_at 2026-04-11T12:55:00Z
7
value 0.00259
scoring_system epss
scoring_elements 0.49244
published_at 2026-04-09T12:55:00Z
8
value 0.00259
scoring_system epss
scoring_elements 0.49248
published_at 2026-04-08T12:55:00Z
9
value 0.00259
scoring_system epss
scoring_elements 0.49193
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1937
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1937
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2349795
reference_id 2349795
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2349795
5
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1938471%2C1940716
reference_id buglist.cgi?bug_id=1938471%2C1940716
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-06T04:55:10Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1938471%2C1940716
6
reference_url https://security.gentoo.org/glsa/202505-02
reference_id GLSA-202505-02
reference_type
scores
url https://security.gentoo.org/glsa/202505-02
7
reference_url https://security.gentoo.org/glsa/202505-03
reference_id GLSA-202505-03
reference_type
scores
url https://security.gentoo.org/glsa/202505-03
8
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-14
reference_id mfsa2025-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-14
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-14/
reference_id mfsa2025-14
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-06T04:55:10Z/
url https://www.mozilla.org/security/advisories/mfsa2025-14/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-15
reference_id mfsa2025-15
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-15
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-15/
reference_id mfsa2025-15
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-06T04:55:10Z/
url https://www.mozilla.org/security/advisories/mfsa2025-15/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-16
reference_id mfsa2025-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-16
14
reference_url https://www.mozilla.org/security/advisories/mfsa2025-16/
reference_id mfsa2025-16
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-06T04:55:10Z/
url https://www.mozilla.org/security/advisories/mfsa2025-16/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-17
reference_id mfsa2025-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-17
16
reference_url https://www.mozilla.org/security/advisories/mfsa2025-17/
reference_id mfsa2025-17
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-06T04:55:10Z/
url https://www.mozilla.org/security/advisories/mfsa2025-17/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-18
reference_id mfsa2025-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-18
18
reference_url https://www.mozilla.org/security/advisories/mfsa2025-18/
reference_id mfsa2025-18
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-06T04:55:10Z/
url https://www.mozilla.org/security/advisories/mfsa2025-18/
19
reference_url https://access.redhat.com/errata/RHSA-2025:2359
reference_id RHSA-2025:2359
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2359
20
reference_url https://access.redhat.com/errata/RHSA-2025:2452
reference_id RHSA-2025:2452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2452
21
reference_url https://access.redhat.com/errata/RHSA-2025:2479
reference_id RHSA-2025:2479
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2479
22
reference_url https://access.redhat.com/errata/RHSA-2025:2480
reference_id RHSA-2025:2480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2480
23
reference_url https://access.redhat.com/errata/RHSA-2025:2481
reference_id RHSA-2025:2481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2481
24
reference_url https://access.redhat.com/errata/RHSA-2025:2484
reference_id RHSA-2025:2484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2484
25
reference_url https://access.redhat.com/errata/RHSA-2025:2485
reference_id RHSA-2025:2485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2485
26
reference_url https://access.redhat.com/errata/RHSA-2025:2486
reference_id RHSA-2025:2486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2486
27
reference_url https://access.redhat.com/errata/RHSA-2025:2699
reference_id RHSA-2025:2699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2699
28
reference_url https://access.redhat.com/errata/RHSA-2025:2708
reference_id RHSA-2025:2708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2708
29
reference_url https://access.redhat.com/errata/RHSA-2025:2899
reference_id RHSA-2025:2899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2899
30
reference_url https://access.redhat.com/errata/RHSA-2025:2900
reference_id RHSA-2025:2900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2900
31
reference_url https://access.redhat.com/errata/RHSA-2025:2957
reference_id RHSA-2025:2957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2957
32
reference_url https://access.redhat.com/errata/RHSA-2025:2958
reference_id RHSA-2025:2958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2958
33
reference_url https://access.redhat.com/errata/RHSA-2025:2959
reference_id RHSA-2025:2959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2959
34
reference_url https://access.redhat.com/errata/RHSA-2025:2960
reference_id RHSA-2025:2960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2960
35
reference_url https://access.redhat.com/errata/RHSA-2025:3009
reference_id RHSA-2025:3009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3009
36
reference_url https://access.redhat.com/errata/RHSA-2025:3013
reference_id RHSA-2025:3013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3013
37
reference_url https://access.redhat.com/errata/RHSA-2025:3036
reference_id RHSA-2025:3036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3036
38
reference_url https://usn.ubuntu.com/7334-1/
reference_id USN-7334-1
reference_type
scores
url https://usn.ubuntu.com/7334-1/
39
reference_url https://usn.ubuntu.com/7663-1/
reference_id USN-7663-1
reference_type
scores
url https://usn.ubuntu.com/7663-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2025-1937
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-95vw-esba-23a2
6
url VCID-9caj-c15z-xuf5
vulnerability_id VCID-9caj-c15z-xuf5
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9403.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9403.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9403
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.282
published_at 2026-04-21T12:55:00Z
1
value 0.00103
scoring_system epss
scoring_elements 0.2845
published_at 2026-04-04T12:55:00Z
2
value 0.00103
scoring_system epss
scoring_elements 0.28242
published_at 2026-04-07T12:55:00Z
3
value 0.00103
scoring_system epss
scoring_elements 0.28308
published_at 2026-04-08T12:55:00Z
4
value 0.00103
scoring_system epss
scoring_elements 0.28351
published_at 2026-04-09T12:55:00Z
5
value 0.00103
scoring_system epss
scoring_elements 0.28355
published_at 2026-04-11T12:55:00Z
6
value 0.00103
scoring_system epss
scoring_elements 0.28312
published_at 2026-04-12T12:55:00Z
7
value 0.00103
scoring_system epss
scoring_elements 0.28254
published_at 2026-04-13T12:55:00Z
8
value 0.00103
scoring_system epss
scoring_elements 0.28266
published_at 2026-04-16T12:55:00Z
9
value 0.00103
scoring_system epss
scoring_elements 0.28247
published_at 2026-04-18T12:55:00Z
10
value 0.00103
scoring_system epss
scoring_elements 0.28408
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9403
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315947
reference_id 2315947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315947
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:34:25Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:34:25Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
11
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
12
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
13
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
14
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
15
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
16
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
17
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
18
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
19
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
20
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
21
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
22
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
23
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
24
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
25
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
26
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1917807
reference_id show_bug.cgi?id=1917807
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:34:25Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1917807
27
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
28
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-9403
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9caj-c15z-xuf5
7
url VCID-aemu-emvp-hkfh
vulnerability_id VCID-aemu-emvp-hkfh
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10460.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10460.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10460
reference_id
reference_type
scores
0
value 0.00419
scoring_system epss
scoring_elements 0.61919
published_at 2026-04-21T12:55:00Z
1
value 0.00419
scoring_system epss
scoring_elements 0.61936
published_at 2026-04-18T12:55:00Z
2
value 0.00419
scoring_system epss
scoring_elements 0.61931
published_at 2026-04-16T12:55:00Z
3
value 0.00419
scoring_system epss
scoring_elements 0.61832
published_at 2026-04-02T12:55:00Z
4
value 0.00419
scoring_system epss
scoring_elements 0.61883
published_at 2026-04-08T12:55:00Z
5
value 0.00419
scoring_system epss
scoring_elements 0.61834
published_at 2026-04-07T12:55:00Z
6
value 0.00419
scoring_system epss
scoring_elements 0.61862
published_at 2026-04-04T12:55:00Z
7
value 0.00419
scoring_system epss
scoring_elements 0.61888
published_at 2026-04-13T12:55:00Z
8
value 0.00419
scoring_system epss
scoring_elements 0.61908
published_at 2026-04-12T12:55:00Z
9
value 0.00419
scoring_system epss
scoring_elements 0.6192
published_at 2026-04-11T12:55:00Z
10
value 0.00419
scoring_system epss
scoring_elements 0.61899
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10460
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10460
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322444
reference_id 2322444
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322444
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
reference_id mfsa2024-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-55/
reference_id mfsa2024-55
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:40:17Z/
url https://www.mozilla.org/security/advisories/mfsa2024-55/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
reference_id mfsa2024-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-56/
reference_id mfsa2024-56
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:40:17Z/
url https://www.mozilla.org/security/advisories/mfsa2024-56/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
reference_id mfsa2024-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-58/
reference_id mfsa2024-58
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:40:17Z/
url https://www.mozilla.org/security/advisories/mfsa2024-58/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
reference_id mfsa2024-59
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-59/
reference_id mfsa2024-59
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:40:17Z/
url https://www.mozilla.org/security/advisories/mfsa2024-59/
16
reference_url https://access.redhat.com/errata/RHSA-2024:8720
reference_id RHSA-2024:8720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8720
17
reference_url https://access.redhat.com/errata/RHSA-2024:8721
reference_id RHSA-2024:8721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8721
18
reference_url https://access.redhat.com/errata/RHSA-2024:8722
reference_id RHSA-2024:8722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8722
19
reference_url https://access.redhat.com/errata/RHSA-2024:8723
reference_id RHSA-2024:8723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8723
20
reference_url https://access.redhat.com/errata/RHSA-2024:8724
reference_id RHSA-2024:8724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8724
21
reference_url https://access.redhat.com/errata/RHSA-2024:8725
reference_id RHSA-2024:8725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8725
22
reference_url https://access.redhat.com/errata/RHSA-2024:8726
reference_id RHSA-2024:8726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8726
23
reference_url https://access.redhat.com/errata/RHSA-2024:8727
reference_id RHSA-2024:8727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8727
24
reference_url https://access.redhat.com/errata/RHSA-2024:8728
reference_id RHSA-2024:8728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8728
25
reference_url https://access.redhat.com/errata/RHSA-2024:8729
reference_id RHSA-2024:8729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8729
26
reference_url https://access.redhat.com/errata/RHSA-2024:8790
reference_id RHSA-2024:8790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8790
27
reference_url https://access.redhat.com/errata/RHSA-2024:8793
reference_id RHSA-2024:8793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8793
28
reference_url https://access.redhat.com/errata/RHSA-2024:9015
reference_id RHSA-2024:9015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9015
29
reference_url https://access.redhat.com/errata/RHSA-2024:9016
reference_id RHSA-2024:9016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9016
30
reference_url https://access.redhat.com/errata/RHSA-2024:9017
reference_id RHSA-2024:9017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9017
31
reference_url https://access.redhat.com/errata/RHSA-2024:9018
reference_id RHSA-2024:9018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9018
32
reference_url https://access.redhat.com/errata/RHSA-2024:9019
reference_id RHSA-2024:9019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9019
33
reference_url https://access.redhat.com/errata/RHSA-2024:9552
reference_id RHSA-2024:9552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9552
34
reference_url https://access.redhat.com/errata/RHSA-2024:9554
reference_id RHSA-2024:9554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9554
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1912537
reference_id show_bug.cgi?id=1912537
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:40:17Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1912537
36
reference_url https://usn.ubuntu.com/7086-1/
reference_id USN-7086-1
reference_type
scores
url https://usn.ubuntu.com/7086-1/
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-10460
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aemu-emvp-hkfh
8
url VCID-b6ug-rdyx-4uaw
vulnerability_id VCID-b6ug-rdyx-4uaw
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8900.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8900.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8900
reference_id
reference_type
scores
0
value 0.00198
scoring_system epss
scoring_elements 0.41889
published_at 2026-04-21T12:55:00Z
1
value 0.00216
scoring_system epss
scoring_elements 0.44082
published_at 2026-04-07T12:55:00Z
2
value 0.00216
scoring_system epss
scoring_elements 0.44136
published_at 2026-04-09T12:55:00Z
3
value 0.00216
scoring_system epss
scoring_elements 0.44128
published_at 2026-04-02T12:55:00Z
4
value 0.00216
scoring_system epss
scoring_elements 0.44151
published_at 2026-04-04T12:55:00Z
5
value 0.00216
scoring_system epss
scoring_elements 0.44133
published_at 2026-04-08T12:55:00Z
6
value 0.00216
scoring_system epss
scoring_elements 0.44171
published_at 2026-04-18T12:55:00Z
7
value 0.00216
scoring_system epss
scoring_elements 0.44181
published_at 2026-04-16T12:55:00Z
8
value 0.00216
scoring_system epss
scoring_elements 0.44119
published_at 2026-04-13T12:55:00Z
9
value 0.00216
scoring_system epss
scoring_elements 0.44152
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8900
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2312914
reference_id 2312914
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2312914
3
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
4
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
5
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
7
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-18T20:14:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-18T20:14:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-18T20:14:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
12
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
13
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
14
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
15
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
16
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
17
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
18
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
19
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
20
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1872841
reference_id show_bug.cgi?id=1872841
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-18T20:14:27Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1872841
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-8900
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b6ug-rdyx-4uaw
9
url VCID-bsnh-1chq-z7ae
vulnerability_id VCID-bsnh-1chq-z7ae
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9400.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9400.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9400
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.338
published_at 2026-04-21T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33846
published_at 2026-04-16T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33808
published_at 2026-04-13T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33832
published_at 2026-04-18T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33874
published_at 2026-04-11T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33876
published_at 2026-04-09T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33844
published_at 2026-04-08T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33917
published_at 2026-04-02T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33802
published_at 2026-04-07T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.33949
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9400
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315953
reference_id 2315953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315953
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:42:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:42:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:42:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:42:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
15
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
16
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
17
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
18
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
19
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
20
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
21
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
22
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
23
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
24
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
25
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
26
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
27
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
28
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
29
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
30
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
31
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1915249
reference_id show_bug.cgi?id=1915249
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:42:31Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1915249
32
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
33
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-9400
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bsnh-1chq-z7ae
10
url VCID-bwk4-hqx8-97dy
vulnerability_id VCID-bwk4-hqx8-97dy
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10459.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10459.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10459
reference_id
reference_type
scores
0
value 0.0071
scoring_system epss
scoring_elements 0.72276
published_at 2026-04-21T12:55:00Z
1
value 0.0071
scoring_system epss
scoring_elements 0.72289
published_at 2026-04-18T12:55:00Z
2
value 0.0071
scoring_system epss
scoring_elements 0.7228
published_at 2026-04-16T12:55:00Z
3
value 0.0071
scoring_system epss
scoring_elements 0.72237
published_at 2026-04-13T12:55:00Z
4
value 0.0071
scoring_system epss
scoring_elements 0.7222
published_at 2026-04-04T12:55:00Z
5
value 0.0071
scoring_system epss
scoring_elements 0.72195
published_at 2026-04-07T12:55:00Z
6
value 0.0071
scoring_system epss
scoring_elements 0.722
published_at 2026-04-02T12:55:00Z
7
value 0.0071
scoring_system epss
scoring_elements 0.72251
published_at 2026-04-12T12:55:00Z
8
value 0.0071
scoring_system epss
scoring_elements 0.72267
published_at 2026-04-11T12:55:00Z
9
value 0.0071
scoring_system epss
scoring_elements 0.72244
published_at 2026-04-09T12:55:00Z
10
value 0.0071
scoring_system epss
scoring_elements 0.72232
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10459
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10459
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10459
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322429
reference_id 2322429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322429
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
reference_id mfsa2024-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-55/
reference_id mfsa2024-55
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/
url https://www.mozilla.org/security/advisories/mfsa2024-55/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
reference_id mfsa2024-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-56/
reference_id mfsa2024-56
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/
url https://www.mozilla.org/security/advisories/mfsa2024-56/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-57
reference_id mfsa2024-57
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-57
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-57/
reference_id mfsa2024-57
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/
url https://www.mozilla.org/security/advisories/mfsa2024-57/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
reference_id mfsa2024-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-58/
reference_id mfsa2024-58
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/
url https://www.mozilla.org/security/advisories/mfsa2024-58/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
reference_id mfsa2024-59
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-59/
reference_id mfsa2024-59
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/
url https://www.mozilla.org/security/advisories/mfsa2024-59/
18
reference_url https://access.redhat.com/errata/RHSA-2024:8720
reference_id RHSA-2024:8720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8720
19
reference_url https://access.redhat.com/errata/RHSA-2024:8721
reference_id RHSA-2024:8721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8721
20
reference_url https://access.redhat.com/errata/RHSA-2024:8722
reference_id RHSA-2024:8722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8722
21
reference_url https://access.redhat.com/errata/RHSA-2024:8723
reference_id RHSA-2024:8723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8723
22
reference_url https://access.redhat.com/errata/RHSA-2024:8724
reference_id RHSA-2024:8724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8724
23
reference_url https://access.redhat.com/errata/RHSA-2024:8725
reference_id RHSA-2024:8725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8725
24
reference_url https://access.redhat.com/errata/RHSA-2024:8726
reference_id RHSA-2024:8726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8726
25
reference_url https://access.redhat.com/errata/RHSA-2024:8727
reference_id RHSA-2024:8727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8727
26
reference_url https://access.redhat.com/errata/RHSA-2024:8728
reference_id RHSA-2024:8728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8728
27
reference_url https://access.redhat.com/errata/RHSA-2024:8729
reference_id RHSA-2024:8729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8729
28
reference_url https://access.redhat.com/errata/RHSA-2024:8790
reference_id RHSA-2024:8790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8790
29
reference_url https://access.redhat.com/errata/RHSA-2024:8793
reference_id RHSA-2024:8793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8793
30
reference_url https://access.redhat.com/errata/RHSA-2024:9015
reference_id RHSA-2024:9015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9015
31
reference_url https://access.redhat.com/errata/RHSA-2024:9016
reference_id RHSA-2024:9016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9016
32
reference_url https://access.redhat.com/errata/RHSA-2024:9017
reference_id RHSA-2024:9017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9017
33
reference_url https://access.redhat.com/errata/RHSA-2024:9018
reference_id RHSA-2024:9018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9018
34
reference_url https://access.redhat.com/errata/RHSA-2024:9019
reference_id RHSA-2024:9019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9019
35
reference_url https://access.redhat.com/errata/RHSA-2024:9552
reference_id RHSA-2024:9552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9552
36
reference_url https://access.redhat.com/errata/RHSA-2024:9554
reference_id RHSA-2024:9554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9554
37
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1919087
reference_id show_bug.cgi?id=1919087
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1919087
38
reference_url https://usn.ubuntu.com/7086-1/
reference_id USN-7086-1
reference_type
scores
url https://usn.ubuntu.com/7086-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-10459
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bwk4-hqx8-97dy
11
url VCID-dmnj-pt27-3bge
vulnerability_id VCID-dmnj-pt27-3bge
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9391.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9391.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9391
reference_id
reference_type
scores
0
value 0.00357
scoring_system epss
scoring_elements 0.57985
published_at 2026-04-21T12:55:00Z
1
value 0.00357
scoring_system epss
scoring_elements 0.58005
published_at 2026-04-09T12:55:00Z
2
value 0.00357
scoring_system epss
scoring_elements 0.58021
published_at 2026-04-11T12:55:00Z
3
value 0.00357
scoring_system epss
scoring_elements 0.57999
published_at 2026-04-12T12:55:00Z
4
value 0.00357
scoring_system epss
scoring_elements 0.57978
published_at 2026-04-13T12:55:00Z
5
value 0.00357
scoring_system epss
scoring_elements 0.58009
published_at 2026-04-16T12:55:00Z
6
value 0.00357
scoring_system epss
scoring_elements 0.58007
published_at 2026-04-18T12:55:00Z
7
value 0.00357
scoring_system epss
scoring_elements 0.57953
published_at 2026-04-02T12:55:00Z
8
value 0.00357
scoring_system epss
scoring_elements 0.57972
published_at 2026-04-04T12:55:00Z
9
value 0.00357
scoring_system epss
scoring_elements 0.57948
published_at 2026-04-07T12:55:00Z
10
value 0.00357
scoring_system epss
scoring_elements 0.58003
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9391
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315948
reference_id 2315948
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315948
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:56:22Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1892407
reference_id show_bug.cgi?id=1892407
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:56:22Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1892407
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-9391
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dmnj-pt27-3bge
12
url VCID-ds2y-kn7q-vuct
vulnerability_id VCID-ds2y-kn7q-vuct
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10464.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10464.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10464
reference_id
reference_type
scores
0
value 0.00523
scoring_system epss
scoring_elements 0.66945
published_at 2026-04-21T12:55:00Z
1
value 0.00523
scoring_system epss
scoring_elements 0.66963
published_at 2026-04-18T12:55:00Z
2
value 0.00523
scoring_system epss
scoring_elements 0.66949
published_at 2026-04-16T12:55:00Z
3
value 0.00523
scoring_system epss
scoring_elements 0.66916
published_at 2026-04-13T12:55:00Z
4
value 0.00523
scoring_system epss
scoring_elements 0.66947
published_at 2026-04-12T12:55:00Z
5
value 0.00523
scoring_system epss
scoring_elements 0.66961
published_at 2026-04-11T12:55:00Z
6
value 0.00523
scoring_system epss
scoring_elements 0.66941
published_at 2026-04-09T12:55:00Z
7
value 0.00523
scoring_system epss
scoring_elements 0.6688
published_at 2026-04-02T12:55:00Z
8
value 0.00523
scoring_system epss
scoring_elements 0.66927
published_at 2026-04-08T12:55:00Z
9
value 0.00523
scoring_system epss
scoring_elements 0.66879
published_at 2026-04-07T12:55:00Z
10
value 0.00523
scoring_system epss
scoring_elements 0.66906
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10464
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10464
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322424
reference_id 2322424
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322424
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
reference_id mfsa2024-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-55/
reference_id mfsa2024-55
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:48:10Z/
url https://www.mozilla.org/security/advisories/mfsa2024-55/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
reference_id mfsa2024-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-56/
reference_id mfsa2024-56
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:48:10Z/
url https://www.mozilla.org/security/advisories/mfsa2024-56/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
reference_id mfsa2024-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-58/
reference_id mfsa2024-58
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:48:10Z/
url https://www.mozilla.org/security/advisories/mfsa2024-58/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
reference_id mfsa2024-59
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-59/
reference_id mfsa2024-59
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:48:10Z/
url https://www.mozilla.org/security/advisories/mfsa2024-59/
16
reference_url https://access.redhat.com/errata/RHSA-2024:8720
reference_id RHSA-2024:8720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8720
17
reference_url https://access.redhat.com/errata/RHSA-2024:8721
reference_id RHSA-2024:8721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8721
18
reference_url https://access.redhat.com/errata/RHSA-2024:8722
reference_id RHSA-2024:8722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8722
19
reference_url https://access.redhat.com/errata/RHSA-2024:8723
reference_id RHSA-2024:8723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8723
20
reference_url https://access.redhat.com/errata/RHSA-2024:8724
reference_id RHSA-2024:8724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8724
21
reference_url https://access.redhat.com/errata/RHSA-2024:8725
reference_id RHSA-2024:8725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8725
22
reference_url https://access.redhat.com/errata/RHSA-2024:8726
reference_id RHSA-2024:8726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8726
23
reference_url https://access.redhat.com/errata/RHSA-2024:8727
reference_id RHSA-2024:8727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8727
24
reference_url https://access.redhat.com/errata/RHSA-2024:8728
reference_id RHSA-2024:8728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8728
25
reference_url https://access.redhat.com/errata/RHSA-2024:8729
reference_id RHSA-2024:8729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8729
26
reference_url https://access.redhat.com/errata/RHSA-2024:8790
reference_id RHSA-2024:8790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8790
27
reference_url https://access.redhat.com/errata/RHSA-2024:8793
reference_id RHSA-2024:8793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8793
28
reference_url https://access.redhat.com/errata/RHSA-2024:9015
reference_id RHSA-2024:9015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9015
29
reference_url https://access.redhat.com/errata/RHSA-2024:9016
reference_id RHSA-2024:9016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9016
30
reference_url https://access.redhat.com/errata/RHSA-2024:9017
reference_id RHSA-2024:9017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9017
31
reference_url https://access.redhat.com/errata/RHSA-2024:9018
reference_id RHSA-2024:9018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9018
32
reference_url https://access.redhat.com/errata/RHSA-2024:9019
reference_id RHSA-2024:9019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9019
33
reference_url https://access.redhat.com/errata/RHSA-2024:9552
reference_id RHSA-2024:9552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9552
34
reference_url https://access.redhat.com/errata/RHSA-2024:9554
reference_id RHSA-2024:9554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9554
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1913000
reference_id show_bug.cgi?id=1913000
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:48:10Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1913000
36
reference_url https://usn.ubuntu.com/7086-1/
reference_id USN-7086-1
reference_type
scores
url https://usn.ubuntu.com/7086-1/
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-10464
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ds2y-kn7q-vuct
13
url VCID-hfx8-7x82-zqfk
vulnerability_id VCID-hfx8-7x82-zqfk
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10466.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10466.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10466
reference_id
reference_type
scores
0
value 0.00669
scoring_system epss
scoring_elements 0.71341
published_at 2026-04-21T12:55:00Z
1
value 0.00669
scoring_system epss
scoring_elements 0.71362
published_at 2026-04-18T12:55:00Z
2
value 0.00669
scoring_system epss
scoring_elements 0.71356
published_at 2026-04-16T12:55:00Z
3
value 0.00669
scoring_system epss
scoring_elements 0.71272
published_at 2026-04-02T12:55:00Z
4
value 0.00669
scoring_system epss
scoring_elements 0.71306
published_at 2026-04-08T12:55:00Z
5
value 0.00669
scoring_system epss
scoring_elements 0.71265
published_at 2026-04-07T12:55:00Z
6
value 0.00669
scoring_system epss
scoring_elements 0.7129
published_at 2026-04-04T12:55:00Z
7
value 0.00669
scoring_system epss
scoring_elements 0.7131
published_at 2026-04-13T12:55:00Z
8
value 0.00669
scoring_system epss
scoring_elements 0.71327
published_at 2026-04-12T12:55:00Z
9
value 0.00669
scoring_system epss
scoring_elements 0.71342
published_at 2026-04-11T12:55:00Z
10
value 0.00669
scoring_system epss
scoring_elements 0.71319
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10466
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10466
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322438
reference_id 2322438
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322438
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
reference_id mfsa2024-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-55/
reference_id mfsa2024-55
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:30:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-55/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
reference_id mfsa2024-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-56/
reference_id mfsa2024-56
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:30:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-56/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
reference_id mfsa2024-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-58/
reference_id mfsa2024-58
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:30:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-58/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
reference_id mfsa2024-59
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-59/
reference_id mfsa2024-59
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:30:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-59/
16
reference_url https://access.redhat.com/errata/RHSA-2024:8720
reference_id RHSA-2024:8720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8720
17
reference_url https://access.redhat.com/errata/RHSA-2024:8721
reference_id RHSA-2024:8721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8721
18
reference_url https://access.redhat.com/errata/RHSA-2024:8722
reference_id RHSA-2024:8722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8722
19
reference_url https://access.redhat.com/errata/RHSA-2024:8723
reference_id RHSA-2024:8723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8723
20
reference_url https://access.redhat.com/errata/RHSA-2024:8724
reference_id RHSA-2024:8724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8724
21
reference_url https://access.redhat.com/errata/RHSA-2024:8725
reference_id RHSA-2024:8725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8725
22
reference_url https://access.redhat.com/errata/RHSA-2024:8726
reference_id RHSA-2024:8726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8726
23
reference_url https://access.redhat.com/errata/RHSA-2024:8727
reference_id RHSA-2024:8727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8727
24
reference_url https://access.redhat.com/errata/RHSA-2024:8728
reference_id RHSA-2024:8728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8728
25
reference_url https://access.redhat.com/errata/RHSA-2024:8729
reference_id RHSA-2024:8729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8729
26
reference_url https://access.redhat.com/errata/RHSA-2024:8790
reference_id RHSA-2024:8790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8790
27
reference_url https://access.redhat.com/errata/RHSA-2024:8793
reference_id RHSA-2024:8793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8793
28
reference_url https://access.redhat.com/errata/RHSA-2024:9015
reference_id RHSA-2024:9015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9015
29
reference_url https://access.redhat.com/errata/RHSA-2024:9016
reference_id RHSA-2024:9016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9016
30
reference_url https://access.redhat.com/errata/RHSA-2024:9017
reference_id RHSA-2024:9017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9017
31
reference_url https://access.redhat.com/errata/RHSA-2024:9018
reference_id RHSA-2024:9018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9018
32
reference_url https://access.redhat.com/errata/RHSA-2024:9019
reference_id RHSA-2024:9019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9019
33
reference_url https://access.redhat.com/errata/RHSA-2024:9552
reference_id RHSA-2024:9552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9552
34
reference_url https://access.redhat.com/errata/RHSA-2024:9554
reference_id RHSA-2024:9554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9554
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1924154
reference_id show_bug.cgi?id=1924154
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:30:57Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1924154
36
reference_url https://usn.ubuntu.com/7086-1/
reference_id USN-7086-1
reference_type
scores
url https://usn.ubuntu.com/7086-1/
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-10466
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hfx8-7x82-zqfk
14
url VCID-hu6v-g43k-9uep
vulnerability_id VCID-hu6v-g43k-9uep
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9395.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9395.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9395
reference_id
reference_type
scores
0
value 0.00286
scoring_system epss
scoring_elements 0.521
published_at 2026-04-21T12:55:00Z
1
value 0.00286
scoring_system epss
scoring_elements 0.52056
published_at 2026-04-09T12:55:00Z
2
value 0.00286
scoring_system epss
scoring_elements 0.52108
published_at 2026-04-11T12:55:00Z
3
value 0.00286
scoring_system epss
scoring_elements 0.52091
published_at 2026-04-12T12:55:00Z
4
value 0.00286
scoring_system epss
scoring_elements 0.52074
published_at 2026-04-13T12:55:00Z
5
value 0.00286
scoring_system epss
scoring_elements 0.52114
published_at 2026-04-16T12:55:00Z
6
value 0.00286
scoring_system epss
scoring_elements 0.52118
published_at 2026-04-18T12:55:00Z
7
value 0.00286
scoring_system epss
scoring_elements 0.52013
published_at 2026-04-02T12:55:00Z
8
value 0.00286
scoring_system epss
scoring_elements 0.52039
published_at 2026-04-04T12:55:00Z
9
value 0.00286
scoring_system epss
scoring_elements 0.52005
published_at 2026-04-07T12:55:00Z
10
value 0.00286
scoring_system epss
scoring_elements 0.52059
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9395
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315958
reference_id 2315958
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315958
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:40:46Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1906024
reference_id show_bug.cgi?id=1906024
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:40:46Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1906024
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-9395
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hu6v-g43k-9uep
15
url VCID-jebk-6hja-ukfc
vulnerability_id VCID-jebk-6hja-ukfc
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9402.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9402.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9402
reference_id
reference_type
scores
0
value 0.00125
scoring_system epss
scoring_elements 0.31734
published_at 2026-04-21T12:55:00Z
1
value 0.00125
scoring_system epss
scoring_elements 0.31764
published_at 2026-04-18T12:55:00Z
2
value 0.00125
scoring_system epss
scoring_elements 0.31785
published_at 2026-04-16T12:55:00Z
3
value 0.00125
scoring_system epss
scoring_elements 0.31753
published_at 2026-04-13T12:55:00Z
4
value 0.00125
scoring_system epss
scoring_elements 0.31789
published_at 2026-04-12T12:55:00Z
5
value 0.00125
scoring_system epss
scoring_elements 0.31829
published_at 2026-04-11T12:55:00Z
6
value 0.00125
scoring_system epss
scoring_elements 0.31826
published_at 2026-04-09T12:55:00Z
7
value 0.00125
scoring_system epss
scoring_elements 0.31883
published_at 2026-04-02T12:55:00Z
8
value 0.00125
scoring_system epss
scoring_elements 0.31796
published_at 2026-04-08T12:55:00Z
9
value 0.00125
scoring_system epss
scoring_elements 0.31745
published_at 2026-04-07T12:55:00Z
10
value 0.00125
scoring_system epss
scoring_elements 0.31926
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9402
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315951
reference_id 2315951
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315951
4
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1913445%2C1914106%2C1914475%2C1914963%2C1915008%2C1916476
reference_id buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1913445%2C1914106%2C1914475%2C1914963%2C1915008%2C1916476
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:36:13Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1913445%2C1914106%2C1914475%2C1914963%2C1915008%2C1916476
5
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
6
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:36:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:36:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:36:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:36:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
16
reference_url https://access.redhat.com/errata/RHSA-2024:7505
reference_id RHSA-2024:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7505
17
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
18
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
19
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
20
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
21
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
22
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
23
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
24
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
25
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
26
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
27
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
28
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
29
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
30
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
31
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
32
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
33
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
34
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-9402
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jebk-6hja-ukfc
16
url VCID-k3ec-bt9r-pkhg
vulnerability_id VCID-k3ec-bt9r-pkhg
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9397.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9397.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9397
reference_id
reference_type
scores
0
value 0.00218
scoring_system epss
scoring_elements 0.44433
published_at 2026-04-21T12:55:00Z
1
value 0.00218
scoring_system epss
scoring_elements 0.44502
published_at 2026-04-18T12:55:00Z
2
value 0.00218
scoring_system epss
scoring_elements 0.44511
published_at 2026-04-16T12:55:00Z
3
value 0.00218
scoring_system epss
scoring_elements 0.44456
published_at 2026-04-12T12:55:00Z
4
value 0.00218
scoring_system epss
scoring_elements 0.44486
published_at 2026-04-11T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.4447
published_at 2026-04-09T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.44463
published_at 2026-04-08T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44455
published_at 2026-04-13T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.44412
published_at 2026-04-07T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.44476
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9397
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315949
reference_id 2315949
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315949
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
15
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
16
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
17
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
18
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
19
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
20
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
21
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
22
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
23
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
24
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
25
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
26
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
27
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
28
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
29
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
30
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
31
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1916659
reference_id show_bug.cgi?id=1916659
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:55:57Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1916659
32
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
33
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-9397
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k3ec-bt9r-pkhg
17
url VCID-ka9e-ps8e-ryc8
vulnerability_id VCID-ka9e-ps8e-ryc8
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9392.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9392.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9392
reference_id
reference_type
scores
0
value 0.00135
scoring_system epss
scoring_elements 0.33203
published_at 2026-04-21T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.35144
published_at 2026-04-16T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35106
published_at 2026-04-13T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.35091
published_at 2026-04-07T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.3513
published_at 2026-04-18T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.35162
published_at 2026-04-09T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.35136
published_at 2026-04-08T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35181
published_at 2026-04-02T12:55:00Z
8
value 0.00147
scoring_system epss
scoring_elements 0.3521
published_at 2026-04-04T12:55:00Z
9
value 0.00147
scoring_system epss
scoring_elements 0.35131
published_at 2026-04-12T12:55:00Z
10
value 0.00147
scoring_system epss
scoring_elements 0.35166
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9392
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9392
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315959
reference_id 2315959
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315959
5
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
6
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
reference_id mfsa2024-48
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-48/
reference_id mfsa2024-48
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-48/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
18
reference_url https://access.redhat.com/errata/RHSA-2024:7505
reference_id RHSA-2024:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7505
19
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
20
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
21
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
22
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
23
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
24
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
25
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
26
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
27
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
28
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
29
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
30
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
31
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
32
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
33
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
34
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1899154
reference_id show_bug.cgi?id=1899154
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1899154
36
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1905843
reference_id show_bug.cgi?id=1905843
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1905843
37
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-9392
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ka9e-ps8e-ryc8
18
url VCID-kpun-mgtm-5uhd
vulnerability_id VCID-kpun-mgtm-5uhd
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9399.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9399.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9399
reference_id
reference_type
scores
0
value 0.0026
scoring_system epss
scoring_elements 0.49361
published_at 2026-04-21T12:55:00Z
1
value 0.0026
scoring_system epss
scoring_elements 0.49391
published_at 2026-04-18T12:55:00Z
2
value 0.0026
scoring_system epss
scoring_elements 0.49395
published_at 2026-04-16T12:55:00Z
3
value 0.0026
scoring_system epss
scoring_elements 0.49321
published_at 2026-04-02T12:55:00Z
4
value 0.0026
scoring_system epss
scoring_elements 0.49358
published_at 2026-04-08T12:55:00Z
5
value 0.0026
scoring_system epss
scoring_elements 0.49304
published_at 2026-04-07T12:55:00Z
6
value 0.0026
scoring_system epss
scoring_elements 0.49349
published_at 2026-04-04T12:55:00Z
7
value 0.0026
scoring_system epss
scoring_elements 0.49347
published_at 2026-04-13T12:55:00Z
8
value 0.0026
scoring_system epss
scoring_elements 0.49345
published_at 2026-04-12T12:55:00Z
9
value 0.0026
scoring_system epss
scoring_elements 0.49371
published_at 2026-04-11T12:55:00Z
10
value 0.0026
scoring_system epss
scoring_elements 0.49353
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9399
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315945
reference_id 2315945
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315945
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:39:09Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:39:09Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:39:09Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:39:09Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
15
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
16
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
17
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
18
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
19
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
20
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
21
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
22
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
23
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
24
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
25
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
26
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
27
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
28
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
29
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
30
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
31
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1907726
reference_id show_bug.cgi?id=1907726
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:39:09Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1907726
32
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
33
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-9399
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kpun-mgtm-5uhd
19
url VCID-mw96-qtnz-gqdx
vulnerability_id VCID-mw96-qtnz-gqdx
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10465.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10465.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10465
reference_id
reference_type
scores
0
value 0.00502
scoring_system epss
scoring_elements 0.66065
published_at 2026-04-21T12:55:00Z
1
value 0.00502
scoring_system epss
scoring_elements 0.66077
published_at 2026-04-18T12:55:00Z
2
value 0.00502
scoring_system epss
scoring_elements 0.66063
published_at 2026-04-16T12:55:00Z
3
value 0.00502
scoring_system epss
scoring_elements 0.65994
published_at 2026-04-02T12:55:00Z
4
value 0.00502
scoring_system epss
scoring_elements 0.6604
published_at 2026-04-08T12:55:00Z
5
value 0.00502
scoring_system epss
scoring_elements 0.6599
published_at 2026-04-07T12:55:00Z
6
value 0.00502
scoring_system epss
scoring_elements 0.66023
published_at 2026-04-04T12:55:00Z
7
value 0.00502
scoring_system epss
scoring_elements 0.66028
published_at 2026-04-13T12:55:00Z
8
value 0.00502
scoring_system epss
scoring_elements 0.66058
published_at 2026-04-12T12:55:00Z
9
value 0.00502
scoring_system epss
scoring_elements 0.66071
published_at 2026-04-11T12:55:00Z
10
value 0.00502
scoring_system epss
scoring_elements 0.66052
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10465
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10465
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10465
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322434
reference_id 2322434
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322434
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
reference_id mfsa2024-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-55/
reference_id mfsa2024-55
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:41:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-55/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
reference_id mfsa2024-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-56/
reference_id mfsa2024-56
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:41:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-56/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
reference_id mfsa2024-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-58/
reference_id mfsa2024-58
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:41:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-58/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
reference_id mfsa2024-59
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-59/
reference_id mfsa2024-59
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:41:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-59/
16
reference_url https://access.redhat.com/errata/RHSA-2024:8720
reference_id RHSA-2024:8720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8720
17
reference_url https://access.redhat.com/errata/RHSA-2024:8721
reference_id RHSA-2024:8721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8721
18
reference_url https://access.redhat.com/errata/RHSA-2024:8722
reference_id RHSA-2024:8722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8722
19
reference_url https://access.redhat.com/errata/RHSA-2024:8723
reference_id RHSA-2024:8723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8723
20
reference_url https://access.redhat.com/errata/RHSA-2024:8724
reference_id RHSA-2024:8724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8724
21
reference_url https://access.redhat.com/errata/RHSA-2024:8725
reference_id RHSA-2024:8725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8725
22
reference_url https://access.redhat.com/errata/RHSA-2024:8726
reference_id RHSA-2024:8726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8726
23
reference_url https://access.redhat.com/errata/RHSA-2024:8727
reference_id RHSA-2024:8727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8727
24
reference_url https://access.redhat.com/errata/RHSA-2024:8728
reference_id RHSA-2024:8728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8728
25
reference_url https://access.redhat.com/errata/RHSA-2024:8729
reference_id RHSA-2024:8729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8729
26
reference_url https://access.redhat.com/errata/RHSA-2024:8790
reference_id RHSA-2024:8790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8790
27
reference_url https://access.redhat.com/errata/RHSA-2024:8793
reference_id RHSA-2024:8793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8793
28
reference_url https://access.redhat.com/errata/RHSA-2024:9015
reference_id RHSA-2024:9015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9015
29
reference_url https://access.redhat.com/errata/RHSA-2024:9016
reference_id RHSA-2024:9016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9016
30
reference_url https://access.redhat.com/errata/RHSA-2024:9017
reference_id RHSA-2024:9017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9017
31
reference_url https://access.redhat.com/errata/RHSA-2024:9018
reference_id RHSA-2024:9018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9018
32
reference_url https://access.redhat.com/errata/RHSA-2024:9019
reference_id RHSA-2024:9019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9019
33
reference_url https://access.redhat.com/errata/RHSA-2024:9552
reference_id RHSA-2024:9552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9552
34
reference_url https://access.redhat.com/errata/RHSA-2024:9554
reference_id RHSA-2024:9554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9554
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1918853
reference_id show_bug.cgi?id=1918853
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:41:01Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1918853
36
reference_url https://usn.ubuntu.com/7086-1/
reference_id USN-7086-1
reference_type
scores
url https://usn.ubuntu.com/7086-1/
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-10465
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mw96-qtnz-gqdx
20
url VCID-n4hu-b1t6-xkay
vulnerability_id VCID-n4hu-b1t6-xkay
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10458.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10458.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10458
reference_id
reference_type
scores
0
value 0.00456
scoring_system epss
scoring_elements 0.6392
published_at 2026-04-18T12:55:00Z
1
value 0.00456
scoring_system epss
scoring_elements 0.6391
published_at 2026-04-21T12:55:00Z
2
value 0.00456
scoring_system epss
scoring_elements 0.63874
published_at 2026-04-13T12:55:00Z
3
value 0.00456
scoring_system epss
scoring_elements 0.63921
published_at 2026-04-11T12:55:00Z
4
value 0.00456
scoring_system epss
scoring_elements 0.63856
published_at 2026-04-02T12:55:00Z
5
value 0.00456
scoring_system epss
scoring_elements 0.63884
published_at 2026-04-04T12:55:00Z
6
value 0.00456
scoring_system epss
scoring_elements 0.63908
published_at 2026-04-12T12:55:00Z
7
value 0.00456
scoring_system epss
scoring_elements 0.63841
published_at 2026-04-07T12:55:00Z
8
value 0.00456
scoring_system epss
scoring_elements 0.63891
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10458
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10458
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322428
reference_id 2322428
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322428
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
reference_id mfsa2024-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-55/
reference_id mfsa2024-55
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/
url https://www.mozilla.org/security/advisories/mfsa2024-55/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
reference_id mfsa2024-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-56/
reference_id mfsa2024-56
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/
url https://www.mozilla.org/security/advisories/mfsa2024-56/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-57
reference_id mfsa2024-57
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-57
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-57/
reference_id mfsa2024-57
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/
url https://www.mozilla.org/security/advisories/mfsa2024-57/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
reference_id mfsa2024-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-58/
reference_id mfsa2024-58
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/
url https://www.mozilla.org/security/advisories/mfsa2024-58/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
reference_id mfsa2024-59
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-59/
reference_id mfsa2024-59
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/
url https://www.mozilla.org/security/advisories/mfsa2024-59/
18
reference_url https://access.redhat.com/errata/RHSA-2024:8720
reference_id RHSA-2024:8720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8720
19
reference_url https://access.redhat.com/errata/RHSA-2024:8721
reference_id RHSA-2024:8721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8721
20
reference_url https://access.redhat.com/errata/RHSA-2024:8722
reference_id RHSA-2024:8722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8722
21
reference_url https://access.redhat.com/errata/RHSA-2024:8723
reference_id RHSA-2024:8723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8723
22
reference_url https://access.redhat.com/errata/RHSA-2024:8724
reference_id RHSA-2024:8724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8724
23
reference_url https://access.redhat.com/errata/RHSA-2024:8725
reference_id RHSA-2024:8725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8725
24
reference_url https://access.redhat.com/errata/RHSA-2024:8726
reference_id RHSA-2024:8726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8726
25
reference_url https://access.redhat.com/errata/RHSA-2024:8727
reference_id RHSA-2024:8727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8727
26
reference_url https://access.redhat.com/errata/RHSA-2024:8728
reference_id RHSA-2024:8728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8728
27
reference_url https://access.redhat.com/errata/RHSA-2024:8729
reference_id RHSA-2024:8729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8729
28
reference_url https://access.redhat.com/errata/RHSA-2024:8790
reference_id RHSA-2024:8790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8790
29
reference_url https://access.redhat.com/errata/RHSA-2024:8793
reference_id RHSA-2024:8793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8793
30
reference_url https://access.redhat.com/errata/RHSA-2024:9015
reference_id RHSA-2024:9015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9015
31
reference_url https://access.redhat.com/errata/RHSA-2024:9016
reference_id RHSA-2024:9016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9016
32
reference_url https://access.redhat.com/errata/RHSA-2024:9017
reference_id RHSA-2024:9017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9017
33
reference_url https://access.redhat.com/errata/RHSA-2024:9018
reference_id RHSA-2024:9018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9018
34
reference_url https://access.redhat.com/errata/RHSA-2024:9019
reference_id RHSA-2024:9019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9019
35
reference_url https://access.redhat.com/errata/RHSA-2024:9552
reference_id RHSA-2024:9552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9552
36
reference_url https://access.redhat.com/errata/RHSA-2024:9554
reference_id RHSA-2024:9554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9554
37
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1921733
reference_id show_bug.cgi?id=1921733
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1921733
38
reference_url https://usn.ubuntu.com/7086-1/
reference_id USN-7086-1
reference_type
scores
url https://usn.ubuntu.com/7086-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-10458
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n4hu-b1t6-xkay
21
url VCID-pcrz-f3nj-kybr
vulnerability_id VCID-pcrz-f3nj-kybr
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1938.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1938.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1938
reference_id
reference_type
scores
0
value 0.00259
scoring_system epss
scoring_elements 0.49263
published_at 2026-04-13T12:55:00Z
1
value 0.00259
scoring_system epss
scoring_elements 0.49307
published_at 2026-04-18T12:55:00Z
2
value 0.00259
scoring_system epss
scoring_elements 0.49258
published_at 2026-04-12T12:55:00Z
3
value 0.00259
scoring_system epss
scoring_elements 0.49311
published_at 2026-04-16T12:55:00Z
4
value 0.00317
scoring_system epss
scoring_elements 0.54804
published_at 2026-04-04T12:55:00Z
5
value 0.00317
scoring_system epss
scoring_elements 0.54781
published_at 2026-04-02T12:55:00Z
6
value 0.00317
scoring_system epss
scoring_elements 0.54832
published_at 2026-04-11T12:55:00Z
7
value 0.00317
scoring_system epss
scoring_elements 0.54821
published_at 2026-04-09T12:55:00Z
8
value 0.00317
scoring_system epss
scoring_elements 0.54824
published_at 2026-04-08T12:55:00Z
9
value 0.00317
scoring_system epss
scoring_elements 0.54773
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1938
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1938
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2349793
reference_id 2349793
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2349793
5
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1922889%2C1935004%2C1943586%2C1943912%2C1948111
reference_id buglist.cgi?bug_id=1922889%2C1935004%2C1943586%2C1943912%2C1948111
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-06T04:55:08Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1922889%2C1935004%2C1943586%2C1943912%2C1948111
6
reference_url https://security.gentoo.org/glsa/202505-02
reference_id GLSA-202505-02
reference_type
scores
url https://security.gentoo.org/glsa/202505-02
7
reference_url https://security.gentoo.org/glsa/202505-03
reference_id GLSA-202505-03
reference_type
scores
url https://security.gentoo.org/glsa/202505-03
8
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-14
reference_id mfsa2025-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-14
10
reference_url https://www.mozilla.org/security/advisories/mfsa2025-14/
reference_id mfsa2025-14
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-06T04:55:08Z/
url https://www.mozilla.org/security/advisories/mfsa2025-14/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-16
reference_id mfsa2025-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2025-16/
reference_id mfsa2025-16
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-06T04:55:08Z/
url https://www.mozilla.org/security/advisories/mfsa2025-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-17
reference_id mfsa2025-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2025-17/
reference_id mfsa2025-17
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-06T04:55:08Z/
url https://www.mozilla.org/security/advisories/mfsa2025-17/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-18
reference_id mfsa2025-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-18
16
reference_url https://www.mozilla.org/security/advisories/mfsa2025-18/
reference_id mfsa2025-18
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-06T04:55:08Z/
url https://www.mozilla.org/security/advisories/mfsa2025-18/
17
reference_url https://access.redhat.com/errata/RHSA-2025:2359
reference_id RHSA-2025:2359
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2359
18
reference_url https://access.redhat.com/errata/RHSA-2025:2452
reference_id RHSA-2025:2452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2452
19
reference_url https://access.redhat.com/errata/RHSA-2025:2479
reference_id RHSA-2025:2479
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2479
20
reference_url https://access.redhat.com/errata/RHSA-2025:2480
reference_id RHSA-2025:2480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2480
21
reference_url https://access.redhat.com/errata/RHSA-2025:2481
reference_id RHSA-2025:2481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2481
22
reference_url https://access.redhat.com/errata/RHSA-2025:2484
reference_id RHSA-2025:2484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2484
23
reference_url https://access.redhat.com/errata/RHSA-2025:2485
reference_id RHSA-2025:2485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2485
24
reference_url https://access.redhat.com/errata/RHSA-2025:2486
reference_id RHSA-2025:2486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2486
25
reference_url https://access.redhat.com/errata/RHSA-2025:2699
reference_id RHSA-2025:2699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2699
26
reference_url https://access.redhat.com/errata/RHSA-2025:2708
reference_id RHSA-2025:2708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2708
27
reference_url https://access.redhat.com/errata/RHSA-2025:2899
reference_id RHSA-2025:2899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2899
28
reference_url https://access.redhat.com/errata/RHSA-2025:2900
reference_id RHSA-2025:2900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2900
29
reference_url https://access.redhat.com/errata/RHSA-2025:2957
reference_id RHSA-2025:2957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2957
30
reference_url https://access.redhat.com/errata/RHSA-2025:2958
reference_id RHSA-2025:2958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2958
31
reference_url https://access.redhat.com/errata/RHSA-2025:2959
reference_id RHSA-2025:2959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2959
32
reference_url https://access.redhat.com/errata/RHSA-2025:2960
reference_id RHSA-2025:2960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2960
33
reference_url https://access.redhat.com/errata/RHSA-2025:3009
reference_id RHSA-2025:3009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3009
34
reference_url https://access.redhat.com/errata/RHSA-2025:3013
reference_id RHSA-2025:3013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3013
35
reference_url https://access.redhat.com/errata/RHSA-2025:3036
reference_id RHSA-2025:3036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3036
36
reference_url https://usn.ubuntu.com/7663-1/
reference_id USN-7663-1
reference_type
scores
url https://usn.ubuntu.com/7663-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2025-1938
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pcrz-f3nj-kybr
22
url VCID-rcg4-7hjg-v7du
vulnerability_id VCID-rcg4-7hjg-v7du
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10463.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10463.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10463
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.64514
published_at 2026-04-21T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.64522
published_at 2026-04-18T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.6451
published_at 2026-04-16T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.64476
published_at 2026-04-13T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.64477
published_at 2026-04-04T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.64436
published_at 2026-04-07T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64447
published_at 2026-04-02T12:55:00Z
7
value 0.00468
scoring_system epss
scoring_elements 0.64504
published_at 2026-04-12T12:55:00Z
8
value 0.00468
scoring_system epss
scoring_elements 0.64516
published_at 2026-04-11T12:55:00Z
9
value 0.00468
scoring_system epss
scoring_elements 0.64501
published_at 2026-04-09T12:55:00Z
10
value 0.00468
scoring_system epss
scoring_elements 0.64484
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10463
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10463
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322439
reference_id 2322439
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322439
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
reference_id mfsa2024-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-55/
reference_id mfsa2024-55
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/
url https://www.mozilla.org/security/advisories/mfsa2024-55/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
reference_id mfsa2024-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-56/
reference_id mfsa2024-56
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/
url https://www.mozilla.org/security/advisories/mfsa2024-56/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-57
reference_id mfsa2024-57
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-57
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-57/
reference_id mfsa2024-57
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/
url https://www.mozilla.org/security/advisories/mfsa2024-57/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
reference_id mfsa2024-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-58/
reference_id mfsa2024-58
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/
url https://www.mozilla.org/security/advisories/mfsa2024-58/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
reference_id mfsa2024-59
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-59/
reference_id mfsa2024-59
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/
url https://www.mozilla.org/security/advisories/mfsa2024-59/
18
reference_url https://access.redhat.com/errata/RHSA-2024:8720
reference_id RHSA-2024:8720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8720
19
reference_url https://access.redhat.com/errata/RHSA-2024:8721
reference_id RHSA-2024:8721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8721
20
reference_url https://access.redhat.com/errata/RHSA-2024:8722
reference_id RHSA-2024:8722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8722
21
reference_url https://access.redhat.com/errata/RHSA-2024:8723
reference_id RHSA-2024:8723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8723
22
reference_url https://access.redhat.com/errata/RHSA-2024:8724
reference_id RHSA-2024:8724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8724
23
reference_url https://access.redhat.com/errata/RHSA-2024:8725
reference_id RHSA-2024:8725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8725
24
reference_url https://access.redhat.com/errata/RHSA-2024:8726
reference_id RHSA-2024:8726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8726
25
reference_url https://access.redhat.com/errata/RHSA-2024:8727
reference_id RHSA-2024:8727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8727
26
reference_url https://access.redhat.com/errata/RHSA-2024:8728
reference_id RHSA-2024:8728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8728
27
reference_url https://access.redhat.com/errata/RHSA-2024:8729
reference_id RHSA-2024:8729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8729
28
reference_url https://access.redhat.com/errata/RHSA-2024:8790
reference_id RHSA-2024:8790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8790
29
reference_url https://access.redhat.com/errata/RHSA-2024:8793
reference_id RHSA-2024:8793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8793
30
reference_url https://access.redhat.com/errata/RHSA-2024:9015
reference_id RHSA-2024:9015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9015
31
reference_url https://access.redhat.com/errata/RHSA-2024:9016
reference_id RHSA-2024:9016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9016
32
reference_url https://access.redhat.com/errata/RHSA-2024:9017
reference_id RHSA-2024:9017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9017
33
reference_url https://access.redhat.com/errata/RHSA-2024:9018
reference_id RHSA-2024:9018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9018
34
reference_url https://access.redhat.com/errata/RHSA-2024:9019
reference_id RHSA-2024:9019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9019
35
reference_url https://access.redhat.com/errata/RHSA-2024:9552
reference_id RHSA-2024:9552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9552
36
reference_url https://access.redhat.com/errata/RHSA-2024:9554
reference_id RHSA-2024:9554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9554
37
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1920800
reference_id show_bug.cgi?id=1920800
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1920800
38
reference_url https://usn.ubuntu.com/7086-1/
reference_id USN-7086-1
reference_type
scores
url https://usn.ubuntu.com/7086-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-10463
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rcg4-7hjg-v7du
23
url VCID-sg2y-gfue-6qam
vulnerability_id VCID-sg2y-gfue-6qam
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10461.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10461.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10461
reference_id
reference_type
scores
0
value 0.00944
scoring_system epss
scoring_elements 0.76335
published_at 2026-04-21T12:55:00Z
1
value 0.00944
scoring_system epss
scoring_elements 0.7635
published_at 2026-04-18T12:55:00Z
2
value 0.00944
scoring_system epss
scoring_elements 0.76345
published_at 2026-04-16T12:55:00Z
3
value 0.00944
scoring_system epss
scoring_elements 0.76248
published_at 2026-04-02T12:55:00Z
4
value 0.00944
scoring_system epss
scoring_elements 0.76291
published_at 2026-04-08T12:55:00Z
5
value 0.00944
scoring_system epss
scoring_elements 0.76259
published_at 2026-04-07T12:55:00Z
6
value 0.00944
scoring_system epss
scoring_elements 0.76278
published_at 2026-04-04T12:55:00Z
7
value 0.00944
scoring_system epss
scoring_elements 0.76309
published_at 2026-04-12T12:55:00Z
8
value 0.00944
scoring_system epss
scoring_elements 0.76331
published_at 2026-04-11T12:55:00Z
9
value 0.00944
scoring_system epss
scoring_elements 0.76305
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10461
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10461
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322425
reference_id 2322425
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322425
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
reference_id mfsa2024-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-55/
reference_id mfsa2024-55
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:04:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-55/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
reference_id mfsa2024-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-56/
reference_id mfsa2024-56
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:04:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-56/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
reference_id mfsa2024-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-58/
reference_id mfsa2024-58
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:04:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-58/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
reference_id mfsa2024-59
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-59/
reference_id mfsa2024-59
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:04:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-59/
16
reference_url https://access.redhat.com/errata/RHSA-2024:8720
reference_id RHSA-2024:8720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8720
17
reference_url https://access.redhat.com/errata/RHSA-2024:8721
reference_id RHSA-2024:8721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8721
18
reference_url https://access.redhat.com/errata/RHSA-2024:8722
reference_id RHSA-2024:8722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8722
19
reference_url https://access.redhat.com/errata/RHSA-2024:8723
reference_id RHSA-2024:8723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8723
20
reference_url https://access.redhat.com/errata/RHSA-2024:8724
reference_id RHSA-2024:8724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8724
21
reference_url https://access.redhat.com/errata/RHSA-2024:8725
reference_id RHSA-2024:8725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8725
22
reference_url https://access.redhat.com/errata/RHSA-2024:8726
reference_id RHSA-2024:8726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8726
23
reference_url https://access.redhat.com/errata/RHSA-2024:8727
reference_id RHSA-2024:8727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8727
24
reference_url https://access.redhat.com/errata/RHSA-2024:8728
reference_id RHSA-2024:8728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8728
25
reference_url https://access.redhat.com/errata/RHSA-2024:8729
reference_id RHSA-2024:8729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8729
26
reference_url https://access.redhat.com/errata/RHSA-2024:8790
reference_id RHSA-2024:8790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8790
27
reference_url https://access.redhat.com/errata/RHSA-2024:8793
reference_id RHSA-2024:8793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8793
28
reference_url https://access.redhat.com/errata/RHSA-2024:9015
reference_id RHSA-2024:9015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9015
29
reference_url https://access.redhat.com/errata/RHSA-2024:9016
reference_id RHSA-2024:9016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9016
30
reference_url https://access.redhat.com/errata/RHSA-2024:9017
reference_id RHSA-2024:9017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9017
31
reference_url https://access.redhat.com/errata/RHSA-2024:9018
reference_id RHSA-2024:9018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9018
32
reference_url https://access.redhat.com/errata/RHSA-2024:9019
reference_id RHSA-2024:9019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9019
33
reference_url https://access.redhat.com/errata/RHSA-2024:9552
reference_id RHSA-2024:9552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9552
34
reference_url https://access.redhat.com/errata/RHSA-2024:9554
reference_id RHSA-2024:9554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9554
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1914521
reference_id show_bug.cgi?id=1914521
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:04:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1914521
36
reference_url https://usn.ubuntu.com/7086-1/
reference_id USN-7086-1
reference_type
scores
url https://usn.ubuntu.com/7086-1/
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-10461
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sg2y-gfue-6qam
24
url VCID-upvn-56py-8ud7
vulnerability_id VCID-upvn-56py-8ud7
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1933.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1933.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1933
reference_id
reference_type
scores
0
value 0.00381
scoring_system epss
scoring_elements 0.59535
published_at 2026-04-04T12:55:00Z
1
value 0.00381
scoring_system epss
scoring_elements 0.5951
published_at 2026-04-02T12:55:00Z
2
value 0.00381
scoring_system epss
scoring_elements 0.59586
published_at 2026-04-11T12:55:00Z
3
value 0.00381
scoring_system epss
scoring_elements 0.59567
published_at 2026-04-09T12:55:00Z
4
value 0.00381
scoring_system epss
scoring_elements 0.59555
published_at 2026-04-08T12:55:00Z
5
value 0.00381
scoring_system epss
scoring_elements 0.59503
published_at 2026-04-07T12:55:00Z
6
value 0.00406
scoring_system epss
scoring_elements 0.6112
published_at 2026-04-16T12:55:00Z
7
value 0.00406
scoring_system epss
scoring_elements 0.61078
published_at 2026-04-13T12:55:00Z
8
value 0.00406
scoring_system epss
scoring_elements 0.61097
published_at 2026-04-12T12:55:00Z
9
value 0.00406
scoring_system epss
scoring_elements 0.61126
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1933
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1933
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2349794
reference_id 2349794
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2349794
5
reference_url https://security.gentoo.org/glsa/202505-02
reference_id GLSA-202505-02
reference_type
scores
url https://security.gentoo.org/glsa/202505-02
6
reference_url https://security.gentoo.org/glsa/202505-03
reference_id GLSA-202505-03
reference_type
scores
url https://security.gentoo.org/glsa/202505-03
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-14
reference_id mfsa2025-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-14
9
reference_url https://www.mozilla.org/security/advisories/mfsa2025-14/
reference_id mfsa2025-14
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-04T15:58:36Z/
url https://www.mozilla.org/security/advisories/mfsa2025-14/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-15
reference_id mfsa2025-15
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-15
11
reference_url https://www.mozilla.org/security/advisories/mfsa2025-15/
reference_id mfsa2025-15
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-04T15:58:36Z/
url https://www.mozilla.org/security/advisories/mfsa2025-15/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-16
reference_id mfsa2025-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-16
13
reference_url https://www.mozilla.org/security/advisories/mfsa2025-16/
reference_id mfsa2025-16
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-04T15:58:36Z/
url https://www.mozilla.org/security/advisories/mfsa2025-16/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-17
reference_id mfsa2025-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-17
15
reference_url https://www.mozilla.org/security/advisories/mfsa2025-17/
reference_id mfsa2025-17
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-04T15:58:36Z/
url https://www.mozilla.org/security/advisories/mfsa2025-17/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-18
reference_id mfsa2025-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-18
17
reference_url https://www.mozilla.org/security/advisories/mfsa2025-18/
reference_id mfsa2025-18
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-04T15:58:36Z/
url https://www.mozilla.org/security/advisories/mfsa2025-18/
18
reference_url https://access.redhat.com/errata/RHSA-2025:2359
reference_id RHSA-2025:2359
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2359
19
reference_url https://access.redhat.com/errata/RHSA-2025:2452
reference_id RHSA-2025:2452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2452
20
reference_url https://access.redhat.com/errata/RHSA-2025:2479
reference_id RHSA-2025:2479
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2479
21
reference_url https://access.redhat.com/errata/RHSA-2025:2480
reference_id RHSA-2025:2480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2480
22
reference_url https://access.redhat.com/errata/RHSA-2025:2481
reference_id RHSA-2025:2481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2481
23
reference_url https://access.redhat.com/errata/RHSA-2025:2484
reference_id RHSA-2025:2484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2484
24
reference_url https://access.redhat.com/errata/RHSA-2025:2485
reference_id RHSA-2025:2485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2485
25
reference_url https://access.redhat.com/errata/RHSA-2025:2486
reference_id RHSA-2025:2486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2486
26
reference_url https://access.redhat.com/errata/RHSA-2025:2699
reference_id RHSA-2025:2699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2699
27
reference_url https://access.redhat.com/errata/RHSA-2025:2708
reference_id RHSA-2025:2708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2708
28
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1946004
reference_id show_bug.cgi?id=1946004
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-04T15:58:36Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1946004
29
reference_url https://usn.ubuntu.com/7334-1/
reference_id USN-7334-1
reference_type
scores
url https://usn.ubuntu.com/7334-1/
30
reference_url https://usn.ubuntu.com/7663-1/
reference_id USN-7663-1
reference_type
scores
url https://usn.ubuntu.com/7663-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2025-1933
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-upvn-56py-8ud7
25
url VCID-vdpy-f9d9-pfac
vulnerability_id VCID-vdpy-f9d9-pfac
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10467.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10467.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10467
reference_id
reference_type
scores
0
value 0.00533
scoring_system epss
scoring_elements 0.67346
published_at 2026-04-21T12:55:00Z
1
value 0.00533
scoring_system epss
scoring_elements 0.67368
published_at 2026-04-18T12:55:00Z
2
value 0.00533
scoring_system epss
scoring_elements 0.67321
published_at 2026-04-13T12:55:00Z
3
value 0.00533
scoring_system epss
scoring_elements 0.67356
published_at 2026-04-16T12:55:00Z
4
value 0.00533
scoring_system epss
scoring_elements 0.67369
published_at 2026-04-11T12:55:00Z
5
value 0.00533
scoring_system epss
scoring_elements 0.67282
published_at 2026-04-02T12:55:00Z
6
value 0.00533
scoring_system epss
scoring_elements 0.67305
published_at 2026-04-04T12:55:00Z
7
value 0.00533
scoring_system epss
scoring_elements 0.67348
published_at 2026-04-09T12:55:00Z
8
value 0.00533
scoring_system epss
scoring_elements 0.67283
published_at 2026-04-07T12:55:00Z
9
value 0.00533
scoring_system epss
scoring_elements 0.67334
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10467
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10467
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322433
reference_id 2322433
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322433
5
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1829029%2C1888538%2C1900394%2C1904059%2C1917742%2C1919809%2C1923706
reference_id buglist.cgi?bug_id=1829029%2C1888538%2C1900394%2C1904059%2C1917742%2C1919809%2C1923706
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:23:47Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1829029%2C1888538%2C1900394%2C1904059%2C1917742%2C1919809%2C1923706
6
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
7
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
8
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
reference_id mfsa2024-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-55/
reference_id mfsa2024-55
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:23:47Z/
url https://www.mozilla.org/security/advisories/mfsa2024-55/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
reference_id mfsa2024-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-56/
reference_id mfsa2024-56
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:23:47Z/
url https://www.mozilla.org/security/advisories/mfsa2024-56/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
reference_id mfsa2024-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-58/
reference_id mfsa2024-58
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:23:47Z/
url https://www.mozilla.org/security/advisories/mfsa2024-58/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
reference_id mfsa2024-59
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-59/
reference_id mfsa2024-59
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:23:47Z/
url https://www.mozilla.org/security/advisories/mfsa2024-59/
17
reference_url https://access.redhat.com/errata/RHSA-2024:8720
reference_id RHSA-2024:8720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8720
18
reference_url https://access.redhat.com/errata/RHSA-2024:8721
reference_id RHSA-2024:8721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8721
19
reference_url https://access.redhat.com/errata/RHSA-2024:8722
reference_id RHSA-2024:8722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8722
20
reference_url https://access.redhat.com/errata/RHSA-2024:8723
reference_id RHSA-2024:8723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8723
21
reference_url https://access.redhat.com/errata/RHSA-2024:8724
reference_id RHSA-2024:8724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8724
22
reference_url https://access.redhat.com/errata/RHSA-2024:8725
reference_id RHSA-2024:8725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8725
23
reference_url https://access.redhat.com/errata/RHSA-2024:8726
reference_id RHSA-2024:8726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8726
24
reference_url https://access.redhat.com/errata/RHSA-2024:8727
reference_id RHSA-2024:8727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8727
25
reference_url https://access.redhat.com/errata/RHSA-2024:8728
reference_id RHSA-2024:8728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8728
26
reference_url https://access.redhat.com/errata/RHSA-2024:8729
reference_id RHSA-2024:8729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8729
27
reference_url https://access.redhat.com/errata/RHSA-2024:8790
reference_id RHSA-2024:8790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8790
28
reference_url https://access.redhat.com/errata/RHSA-2024:8793
reference_id RHSA-2024:8793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8793
29
reference_url https://access.redhat.com/errata/RHSA-2024:9015
reference_id RHSA-2024:9015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9015
30
reference_url https://access.redhat.com/errata/RHSA-2024:9016
reference_id RHSA-2024:9016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9016
31
reference_url https://access.redhat.com/errata/RHSA-2024:9017
reference_id RHSA-2024:9017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9017
32
reference_url https://access.redhat.com/errata/RHSA-2024:9018
reference_id RHSA-2024:9018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9018
33
reference_url https://access.redhat.com/errata/RHSA-2024:9019
reference_id RHSA-2024:9019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9019
34
reference_url https://access.redhat.com/errata/RHSA-2024:9552
reference_id RHSA-2024:9552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9552
35
reference_url https://access.redhat.com/errata/RHSA-2024:9554
reference_id RHSA-2024:9554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9554
36
reference_url https://usn.ubuntu.com/7086-1/
reference_id USN-7086-1
reference_type
scores
url https://usn.ubuntu.com/7086-1/
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-10467
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vdpy-f9d9-pfac
26
url VCID-w6j3-6a6j-uqf1
vulnerability_id VCID-w6j3-6a6j-uqf1
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1931.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1931.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1931
reference_id
reference_type
scores
0
value 0.00322
scoring_system epss
scoring_elements 0.55319
published_at 2026-04-18T12:55:00Z
1
value 0.00322
scoring_system epss
scoring_elements 0.55295
published_at 2026-04-12T12:55:00Z
2
value 0.00322
scoring_system epss
scoring_elements 0.55277
published_at 2026-04-13T12:55:00Z
3
value 0.00322
scoring_system epss
scoring_elements 0.55315
published_at 2026-04-16T12:55:00Z
4
value 0.0049
scoring_system epss
scoring_elements 0.65565
published_at 2026-04-04T12:55:00Z
5
value 0.0049
scoring_system epss
scoring_elements 0.65535
published_at 2026-04-02T12:55:00Z
6
value 0.0049
scoring_system epss
scoring_elements 0.65614
published_at 2026-04-11T12:55:00Z
7
value 0.0049
scoring_system epss
scoring_elements 0.65595
published_at 2026-04-09T12:55:00Z
8
value 0.0049
scoring_system epss
scoring_elements 0.65583
published_at 2026-04-08T12:55:00Z
9
value 0.0049
scoring_system epss
scoring_elements 0.65531
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1931
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1931
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2349786
reference_id 2349786
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2349786
5
reference_url https://security.gentoo.org/glsa/202505-02
reference_id GLSA-202505-02
reference_type
scores
url https://security.gentoo.org/glsa/202505-02
6
reference_url https://security.gentoo.org/glsa/202505-03
reference_id GLSA-202505-03
reference_type
scores
url https://security.gentoo.org/glsa/202505-03
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-14
reference_id mfsa2025-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-14
9
reference_url https://www.mozilla.org/security/advisories/mfsa2025-14/
reference_id mfsa2025-14
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-26T19:54:21Z/
url https://www.mozilla.org/security/advisories/mfsa2025-14/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-15
reference_id mfsa2025-15
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-15
11
reference_url https://www.mozilla.org/security/advisories/mfsa2025-15/
reference_id mfsa2025-15
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-26T19:54:21Z/
url https://www.mozilla.org/security/advisories/mfsa2025-15/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-16
reference_id mfsa2025-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-16
13
reference_url https://www.mozilla.org/security/advisories/mfsa2025-16/
reference_id mfsa2025-16
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-26T19:54:21Z/
url https://www.mozilla.org/security/advisories/mfsa2025-16/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-17
reference_id mfsa2025-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-17
15
reference_url https://www.mozilla.org/security/advisories/mfsa2025-17/
reference_id mfsa2025-17
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-26T19:54:21Z/
url https://www.mozilla.org/security/advisories/mfsa2025-17/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-18
reference_id mfsa2025-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-18
17
reference_url https://www.mozilla.org/security/advisories/mfsa2025-18/
reference_id mfsa2025-18
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-26T19:54:21Z/
url https://www.mozilla.org/security/advisories/mfsa2025-18/
18
reference_url https://access.redhat.com/errata/RHSA-2025:2359
reference_id RHSA-2025:2359
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2359
19
reference_url https://access.redhat.com/errata/RHSA-2025:2452
reference_id RHSA-2025:2452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2452
20
reference_url https://access.redhat.com/errata/RHSA-2025:2479
reference_id RHSA-2025:2479
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2479
21
reference_url https://access.redhat.com/errata/RHSA-2025:2480
reference_id RHSA-2025:2480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2480
22
reference_url https://access.redhat.com/errata/RHSA-2025:2481
reference_id RHSA-2025:2481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2481
23
reference_url https://access.redhat.com/errata/RHSA-2025:2484
reference_id RHSA-2025:2484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2484
24
reference_url https://access.redhat.com/errata/RHSA-2025:2485
reference_id RHSA-2025:2485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2485
25
reference_url https://access.redhat.com/errata/RHSA-2025:2486
reference_id RHSA-2025:2486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2486
26
reference_url https://access.redhat.com/errata/RHSA-2025:2699
reference_id RHSA-2025:2699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2699
27
reference_url https://access.redhat.com/errata/RHSA-2025:2708
reference_id RHSA-2025:2708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2708
28
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1944126
reference_id show_bug.cgi?id=1944126
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-26T19:54:21Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1944126
29
reference_url https://usn.ubuntu.com/7334-1/
reference_id USN-7334-1
reference_type
scores
url https://usn.ubuntu.com/7334-1/
30
reference_url https://usn.ubuntu.com/7663-1/
reference_id USN-7663-1
reference_type
scores
url https://usn.ubuntu.com/7663-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2025-1931
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w6j3-6a6j-uqf1
27
url VCID-y7sk-dmau-4fam
vulnerability_id VCID-y7sk-dmau-4fam
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1936.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1936.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1936
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.35849
published_at 2026-04-13T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.35876
published_at 2026-04-18T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.35873
published_at 2026-04-12T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.35888
published_at 2026-04-16T12:55:00Z
4
value 0.00477
scoring_system epss
scoring_elements 0.64931
published_at 2026-04-04T12:55:00Z
5
value 0.00477
scoring_system epss
scoring_elements 0.64903
published_at 2026-04-02T12:55:00Z
6
value 0.00477
scoring_system epss
scoring_elements 0.64976
published_at 2026-04-11T12:55:00Z
7
value 0.00477
scoring_system epss
scoring_elements 0.64959
published_at 2026-04-09T12:55:00Z
8
value 0.00477
scoring_system epss
scoring_elements 0.64944
published_at 2026-04-08T12:55:00Z
9
value 0.00477
scoring_system epss
scoring_elements 0.64894
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1936
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1936
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2349797
reference_id 2349797
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2349797
5
reference_url https://security.gentoo.org/glsa/202505-02
reference_id GLSA-202505-02
reference_type
scores
url https://security.gentoo.org/glsa/202505-02
6
reference_url https://security.gentoo.org/glsa/202505-03
reference_id GLSA-202505-03
reference_type
scores
url https://security.gentoo.org/glsa/202505-03
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-14
reference_id mfsa2025-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-14
9
reference_url https://www.mozilla.org/security/advisories/mfsa2025-14/
reference_id mfsa2025-14
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-25T17:55:09Z/
url https://www.mozilla.org/security/advisories/mfsa2025-14/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-16
reference_id mfsa2025-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-16
11
reference_url https://www.mozilla.org/security/advisories/mfsa2025-16/
reference_id mfsa2025-16
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-25T17:55:09Z/
url https://www.mozilla.org/security/advisories/mfsa2025-16/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-17
reference_id mfsa2025-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-17
13
reference_url https://www.mozilla.org/security/advisories/mfsa2025-17/
reference_id mfsa2025-17
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-25T17:55:09Z/
url https://www.mozilla.org/security/advisories/mfsa2025-17/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-18
reference_id mfsa2025-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-18
15
reference_url https://www.mozilla.org/security/advisories/mfsa2025-18/
reference_id mfsa2025-18
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-25T17:55:09Z/
url https://www.mozilla.org/security/advisories/mfsa2025-18/
16
reference_url https://access.redhat.com/errata/RHSA-2025:2359
reference_id RHSA-2025:2359
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2359
17
reference_url https://access.redhat.com/errata/RHSA-2025:2452
reference_id RHSA-2025:2452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2452
18
reference_url https://access.redhat.com/errata/RHSA-2025:2479
reference_id RHSA-2025:2479
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2479
19
reference_url https://access.redhat.com/errata/RHSA-2025:2480
reference_id RHSA-2025:2480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2480
20
reference_url https://access.redhat.com/errata/RHSA-2025:2481
reference_id RHSA-2025:2481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2481
21
reference_url https://access.redhat.com/errata/RHSA-2025:2484
reference_id RHSA-2025:2484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2484
22
reference_url https://access.redhat.com/errata/RHSA-2025:2485
reference_id RHSA-2025:2485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2485
23
reference_url https://access.redhat.com/errata/RHSA-2025:2486
reference_id RHSA-2025:2486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2486
24
reference_url https://access.redhat.com/errata/RHSA-2025:2699
reference_id RHSA-2025:2699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2699
25
reference_url https://access.redhat.com/errata/RHSA-2025:2708
reference_id RHSA-2025:2708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2708
26
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1940027
reference_id show_bug.cgi?id=1940027
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-25T17:55:09Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1940027
27
reference_url https://usn.ubuntu.com/7334-1/
reference_id USN-7334-1
reference_type
scores
url https://usn.ubuntu.com/7334-1/
28
reference_url https://usn.ubuntu.com/7663-1/
reference_id USN-7663-1
reference_type
scores
url https://usn.ubuntu.com/7663-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2025-1936
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y7sk-dmau-4fam
28
url VCID-z6yt-va55-s3ey
vulnerability_id VCID-z6yt-va55-s3ey
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9401.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9401.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9401
reference_id
reference_type
scores
0
value 0.00168
scoring_system epss
scoring_elements 0.3795
published_at 2026-04-21T12:55:00Z
1
value 0.00183
scoring_system epss
scoring_elements 0.40067
published_at 2026-04-16T12:55:00Z
2
value 0.00183
scoring_system epss
scoring_elements 0.40018
published_at 2026-04-13T12:55:00Z
3
value 0.00183
scoring_system epss
scoring_elements 0.40037
published_at 2026-04-12T12:55:00Z
4
value 0.00183
scoring_system epss
scoring_elements 0.40074
published_at 2026-04-11T12:55:00Z
5
value 0.00183
scoring_system epss
scoring_elements 0.40063
published_at 2026-04-09T12:55:00Z
6
value 0.00183
scoring_system epss
scoring_elements 0.40049
published_at 2026-04-08T12:55:00Z
7
value 0.00183
scoring_system epss
scoring_elements 0.39996
published_at 2026-04-07T12:55:00Z
8
value 0.00183
scoring_system epss
scoring_elements 0.40048
published_at 2026-04-02T12:55:00Z
9
value 0.00183
scoring_system epss
scoring_elements 0.40038
published_at 2026-04-18T12:55:00Z
10
value 0.00183
scoring_system epss
scoring_elements 0.40075
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9401
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9401
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9401
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315950
reference_id 2315950
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315950
5
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1916476
reference_id buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1916476
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1916476
6
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
7
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
8
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
reference_id mfsa2024-48
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-48/
reference_id mfsa2024-48
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-48/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
18
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
19
reference_url https://access.redhat.com/errata/RHSA-2024:7505
reference_id RHSA-2024:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7505
20
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
21
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
22
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
23
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
24
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
25
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
26
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
27
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
28
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
29
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
30
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
31
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
32
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
33
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
34
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
35
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
36
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-9401
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z6yt-va55-s3ey
29
url VCID-z8cr-rten-qqg2
vulnerability_id VCID-z8cr-rten-qqg2
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1932.json
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1932.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1932
reference_id
reference_type
scores
0
value 0.00183
scoring_system epss
scoring_elements 0.40004
published_at 2026-04-13T12:55:00Z
1
value 0.00183
scoring_system epss
scoring_elements 0.40024
published_at 2026-04-18T12:55:00Z
2
value 0.00183
scoring_system epss
scoring_elements 0.40023
published_at 2026-04-12T12:55:00Z
3
value 0.00183
scoring_system epss
scoring_elements 0.40054
published_at 2026-04-16T12:55:00Z
4
value 0.00208
scoring_system epss
scoring_elements 0.43252
published_at 2026-04-04T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43223
published_at 2026-04-02T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43274
published_at 2026-04-11T12:55:00Z
7
value 0.00208
scoring_system epss
scoring_elements 0.43253
published_at 2026-04-09T12:55:00Z
8
value 0.00208
scoring_system epss
scoring_elements 0.43241
published_at 2026-04-08T12:55:00Z
9
value 0.00208
scoring_system epss
scoring_elements 0.43189
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1932
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1932
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2349796
reference_id 2349796
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2349796
5
reference_url https://security.gentoo.org/glsa/202505-02
reference_id GLSA-202505-02
reference_type
scores
url https://security.gentoo.org/glsa/202505-02
6
reference_url https://security.gentoo.org/glsa/202505-03
reference_id GLSA-202505-03
reference_type
scores
url https://security.gentoo.org/glsa/202505-03
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-14
reference_id mfsa2025-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-14
9
reference_url https://www.mozilla.org/security/advisories/mfsa2025-14/
reference_id mfsa2025-14
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-04T16:05:35Z/
url https://www.mozilla.org/security/advisories/mfsa2025-14/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-16
reference_id mfsa2025-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-16
11
reference_url https://www.mozilla.org/security/advisories/mfsa2025-16/
reference_id mfsa2025-16
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-04T16:05:35Z/
url https://www.mozilla.org/security/advisories/mfsa2025-16/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-17
reference_id mfsa2025-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-17
13
reference_url https://www.mozilla.org/security/advisories/mfsa2025-17/
reference_id mfsa2025-17
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-04T16:05:35Z/
url https://www.mozilla.org/security/advisories/mfsa2025-17/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-18
reference_id mfsa2025-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-18
15
reference_url https://www.mozilla.org/security/advisories/mfsa2025-18/
reference_id mfsa2025-18
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-04T16:05:35Z/
url https://www.mozilla.org/security/advisories/mfsa2025-18/
16
reference_url https://access.redhat.com/errata/RHSA-2025:2359
reference_id RHSA-2025:2359
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2359
17
reference_url https://access.redhat.com/errata/RHSA-2025:2452
reference_id RHSA-2025:2452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2452
18
reference_url https://access.redhat.com/errata/RHSA-2025:2479
reference_id RHSA-2025:2479
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2479
19
reference_url https://access.redhat.com/errata/RHSA-2025:2480
reference_id RHSA-2025:2480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2480
20
reference_url https://access.redhat.com/errata/RHSA-2025:2481
reference_id RHSA-2025:2481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2481
21
reference_url https://access.redhat.com/errata/RHSA-2025:2484
reference_id RHSA-2025:2484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2484
22
reference_url https://access.redhat.com/errata/RHSA-2025:2485
reference_id RHSA-2025:2485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2485
23
reference_url https://access.redhat.com/errata/RHSA-2025:2486
reference_id RHSA-2025:2486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2486
24
reference_url https://access.redhat.com/errata/RHSA-2025:2699
reference_id RHSA-2025:2699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2699
25
reference_url https://access.redhat.com/errata/RHSA-2025:2708
reference_id RHSA-2025:2708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2708
26
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1944313
reference_id show_bug.cgi?id=1944313
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-04T16:05:35Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1944313
27
reference_url https://usn.ubuntu.com/7334-1/
reference_id USN-7334-1
reference_type
scores
url https://usn.ubuntu.com/7334-1/
28
reference_url https://usn.ubuntu.com/7663-1/
reference_id USN-7663-1
reference_type
scores
url https://usn.ubuntu.com/7663-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2025-1932
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z8cr-rten-qqg2
30
url VCID-zefw-etrb-z3fu
vulnerability_id VCID-zefw-etrb-z3fu
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-43097
reference_id
reference_type
scores
0
value 0.00912
scoring_system epss
scoring_elements 0.75881
published_at 2026-04-21T12:55:00Z
1
value 0.00912
scoring_system epss
scoring_elements 0.75845
published_at 2026-04-08T12:55:00Z
2
value 0.00912
scoring_system epss
scoring_elements 0.75856
published_at 2026-04-09T12:55:00Z
3
value 0.00912
scoring_system epss
scoring_elements 0.7588
published_at 2026-04-11T12:55:00Z
4
value 0.00912
scoring_system epss
scoring_elements 0.75861
published_at 2026-04-12T12:55:00Z
5
value 0.00912
scoring_system epss
scoring_elements 0.75855
published_at 2026-04-13T12:55:00Z
6
value 0.00912
scoring_system epss
scoring_elements 0.75892
published_at 2026-04-16T12:55:00Z
7
value 0.00912
scoring_system epss
scoring_elements 0.75895
published_at 2026-04-18T12:55:00Z
8
value 0.00912
scoring_system epss
scoring_elements 0.75801
published_at 2026-04-02T12:55:00Z
9
value 0.00912
scoring_system epss
scoring_elements 0.75834
published_at 2026-04-04T12:55:00Z
10
value 0.00912
scoring_system epss
scoring_elements 0.75812
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-43097
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43097
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://source.android.com/security/bulletin/2024-12-01
reference_id 2024-12-01
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-09T15:56:38Z/
url https://source.android.com/security/bulletin/2024-12-01
4
reference_url https://android.googlesource.com/platform/external/skia/+/8d355fe1d0795fc30b84194b87563f75c6f8f2a7
reference_id 8d355fe1d0795fc30b84194b87563f75c6f8f2a7
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-09T15:56:38Z/
url https://android.googlesource.com/platform/external/skia/+/8d355fe1d0795fc30b84194b87563f75c6f8f2a7
5
reference_url https://security.gentoo.org/glsa/202505-02
reference_id GLSA-202505-02
reference_type
scores
url https://security.gentoo.org/glsa/202505-02
6
reference_url https://security.gentoo.org/glsa/202505-03
reference_id GLSA-202505-03
reference_type
scores
url https://security.gentoo.org/glsa/202505-03
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-01
reference_id mfsa2025-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-01
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-15
reference_id mfsa2025-15
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-15
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-16
reference_id mfsa2025-16
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-16
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2025-18
reference_id mfsa2025-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2025-18
12
reference_url https://usn.ubuntu.com/7663-1/
reference_id USN-7663-1
reference_type
scores
url https://usn.ubuntu.com/7663-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@128.8.0
purl pkg:ebuild/dev-lang/spidermonkey@128.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0
aliases CVE-2024-43097
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zefw-etrb-z3fu
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@128.8.0