Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/www-client/firefox@115.6.0
Typeebuild
Namespacewww-client
Namefirefox
Version115.6.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version115.7.0
Latest_non_vulnerable_version137.0.1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2j1e-fjx6-tucr
vulnerability_id VCID-2j1e-fjx6-tucr
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6872
reference_id
reference_type
scores
0
value 0.00251
scoring_system epss
scoring_elements 0.48478
published_at 2026-04-21T12:55:00Z
1
value 0.00251
scoring_system epss
scoring_elements 0.48442
published_at 2026-04-02T12:55:00Z
2
value 0.00251
scoring_system epss
scoring_elements 0.48462
published_at 2026-04-12T12:55:00Z
3
value 0.00251
scoring_system epss
scoring_elements 0.48475
published_at 2026-04-13T12:55:00Z
4
value 0.00251
scoring_system epss
scoring_elements 0.48525
published_at 2026-04-16T12:55:00Z
5
value 0.00251
scoring_system epss
scoring_elements 0.4852
published_at 2026-04-18T12:55:00Z
6
value 0.00251
scoring_system epss
scoring_elements 0.48464
published_at 2026-04-04T12:55:00Z
7
value 0.00251
scoring_system epss
scoring_elements 0.48416
published_at 2026-04-07T12:55:00Z
8
value 0.00251
scoring_system epss
scoring_elements 0.48471
published_at 2026-04-08T12:55:00Z
9
value 0.00251
scoring_system epss
scoring_elements 0.48465
published_at 2026-04-09T12:55:00Z
10
value 0.00251
scoring_system epss
scoring_elements 0.48488
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6872
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
2
reference_url https://www.mozilla.org/security/advisories/mfsa2023-56/
reference_id mfsa2023-56
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-21T20:34:05Z/
url https://www.mozilla.org/security/advisories/mfsa2023-56/
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1849186
reference_id show_bug.cgi?id=1849186
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-21T20:34:05Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1849186
4
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-6872
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2j1e-fjx6-tucr
1
url VCID-3d1e-hqg2-zbbm
vulnerability_id VCID-3d1e-hqg2-zbbm
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-37210
reference_id
reference_type
scores
0
value 0.00175
scoring_system epss
scoring_elements 0.38868
published_at 2026-04-21T12:55:00Z
1
value 0.00175
scoring_system epss
scoring_elements 0.38958
published_at 2026-04-02T12:55:00Z
2
value 0.00175
scoring_system epss
scoring_elements 0.3895
published_at 2026-04-12T12:55:00Z
3
value 0.00175
scoring_system epss
scoring_elements 0.38923
published_at 2026-04-13T12:55:00Z
4
value 0.00175
scoring_system epss
scoring_elements 0.3897
published_at 2026-04-16T12:55:00Z
5
value 0.00175
scoring_system epss
scoring_elements 0.38951
published_at 2026-04-18T12:55:00Z
6
value 0.00175
scoring_system epss
scoring_elements 0.38978
published_at 2026-04-04T12:55:00Z
7
value 0.00175
scoring_system epss
scoring_elements 0.38909
published_at 2026-04-07T12:55:00Z
8
value 0.00175
scoring_system epss
scoring_elements 0.38962
published_at 2026-04-08T12:55:00Z
9
value 0.00175
scoring_system epss
scoring_elements 0.38976
published_at 2026-04-09T12:55:00Z
10
value 0.00175
scoring_system epss
scoring_elements 0.38987
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-37210
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
reference_id mfsa2023-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
2
reference_url https://www.mozilla.org/security/advisories/mfsa2023-22/
reference_id mfsa2023-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:25:23Z/
url https://www.mozilla.org/security/advisories/mfsa2023-22/
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1821886
reference_id show_bug.cgi?id=1821886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:25:23Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1821886
4
reference_url https://usn.ubuntu.com/6201-1/
reference_id USN-6201-1
reference_type
scores
url https://usn.ubuntu.com/6201-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-37210
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3d1e-hqg2-zbbm
2
url VCID-3nrj-5r53-37ab
vulnerability_id VCID-3nrj-5r53-37ab
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6135.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6135.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6135
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.36019
published_at 2026-04-02T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.35875
published_at 2026-04-21T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.35922
published_at 2026-04-12T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.35898
published_at 2026-04-13T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.35938
published_at 2026-04-16T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35925
published_at 2026-04-18T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.3605
published_at 2026-04-04T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.35881
published_at 2026-04-07T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.35932
published_at 2026-04-08T12:55:00Z
9
value 0.00152
scoring_system epss
scoring_elements 0.35955
published_at 2026-04-09T12:55:00Z
10
value 0.00152
scoring_system epss
scoring_elements 0.35961
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6135
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6135
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059054
reference_id 1059054
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059054
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2249906
reference_id 2249906
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2249906
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
6
reference_url https://www.mozilla.org/security/advisories/mfsa2023-56/
reference_id mfsa2023-56
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:59:00Z/
url https://www.mozilla.org/security/advisories/mfsa2023-56/
7
reference_url https://access.redhat.com/errata/RHSA-2024:0785
reference_id RHSA-2024:0785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0785
8
reference_url https://access.redhat.com/errata/RHSA-2024:0786
reference_id RHSA-2024:0786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0786
9
reference_url https://access.redhat.com/errata/RHSA-2024:0790
reference_id RHSA-2024:0790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0790
10
reference_url https://access.redhat.com/errata/RHSA-2024:0791
reference_id RHSA-2024:0791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0791
11
reference_url https://access.redhat.com/errata/RHSA-2024:1686
reference_id RHSA-2024:1686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1686
12
reference_url https://access.redhat.com/errata/RHSA-2024:6782
reference_id RHSA-2024:6782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6782
13
reference_url https://access.redhat.com/errata/RHSA-2024:6786
reference_id RHSA-2024:6786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6786
14
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
15
reference_url https://access.redhat.com/errata/RHSA-2024:6850
reference_id RHSA-2024:6850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6850
16
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1853908
reference_id show_bug.cgi?id=1853908
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:59:00Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1853908
17
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
18
reference_url https://usn.ubuntu.com/6727-1/
reference_id USN-6727-1
reference_type
scores
url https://usn.ubuntu.com/6727-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-6135
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3nrj-5r53-37ab
3
url VCID-43dj-vtap-2qd2
vulnerability_id VCID-43dj-vtap-2qd2
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32206.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32206.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32206
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.34991
published_at 2026-04-21T12:55:00Z
1
value 0.00202
scoring_system epss
scoring_elements 0.4233
published_at 2026-04-08T12:55:00Z
2
value 0.00202
scoring_system epss
scoring_elements 0.42296
published_at 2026-04-13T12:55:00Z
3
value 0.00202
scoring_system epss
scoring_elements 0.42346
published_at 2026-04-16T12:55:00Z
4
value 0.00202
scoring_system epss
scoring_elements 0.42322
published_at 2026-04-18T12:55:00Z
5
value 0.00202
scoring_system epss
scoring_elements 0.42308
published_at 2026-04-02T12:55:00Z
6
value 0.00202
scoring_system epss
scoring_elements 0.42337
published_at 2026-04-04T12:55:00Z
7
value 0.00202
scoring_system epss
scoring_elements 0.42279
published_at 2026-04-07T12:55:00Z
8
value 0.00202
scoring_system epss
scoring_elements 0.42338
published_at 2026-04-09T12:55:00Z
9
value 0.00202
scoring_system epss
scoring_elements 0.42361
published_at 2026-04-11T12:55:00Z
10
value 0.00202
scoring_system epss
scoring_elements 0.42324
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32206
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2196737
reference_id 2196737
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2196737
10
reference_url https://security.gentoo.org/glsa/202312-03
reference_id GLSA-202312-03
reference_type
scores
url https://security.gentoo.org/glsa/202312-03
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
reference_id mfsa2023-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-17
reference_id mfsa2023-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-17
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-18
reference_id mfsa2023-18
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-18
14
reference_url https://access.redhat.com/errata/RHSA-2023:3137
reference_id RHSA-2023:3137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3137
15
reference_url https://access.redhat.com/errata/RHSA-2023:3138
reference_id RHSA-2023:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3138
16
reference_url https://access.redhat.com/errata/RHSA-2023:3139
reference_id RHSA-2023:3139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3139
17
reference_url https://access.redhat.com/errata/RHSA-2023:3140
reference_id RHSA-2023:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3140
18
reference_url https://access.redhat.com/errata/RHSA-2023:3141
reference_id RHSA-2023:3141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3141
19
reference_url https://access.redhat.com/errata/RHSA-2023:3142
reference_id RHSA-2023:3142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3142
20
reference_url https://access.redhat.com/errata/RHSA-2023:3143
reference_id RHSA-2023:3143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3143
21
reference_url https://access.redhat.com/errata/RHSA-2023:3149
reference_id RHSA-2023:3149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3149
22
reference_url https://access.redhat.com/errata/RHSA-2023:3150
reference_id RHSA-2023:3150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3150
23
reference_url https://access.redhat.com/errata/RHSA-2023:3151
reference_id RHSA-2023:3151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3151
24
reference_url https://access.redhat.com/errata/RHSA-2023:3152
reference_id RHSA-2023:3152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3152
25
reference_url https://access.redhat.com/errata/RHSA-2023:3153
reference_id RHSA-2023:3153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3153
26
reference_url https://access.redhat.com/errata/RHSA-2023:3154
reference_id RHSA-2023:3154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3154
27
reference_url https://access.redhat.com/errata/RHSA-2023:3155
reference_id RHSA-2023:3155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3155
28
reference_url https://access.redhat.com/errata/RHSA-2023:3220
reference_id RHSA-2023:3220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3220
29
reference_url https://access.redhat.com/errata/RHSA-2023:3221
reference_id RHSA-2023:3221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3221
30
reference_url https://usn.ubuntu.com/6074-1/
reference_id USN-6074-1
reference_type
scores
url https://usn.ubuntu.com/6074-1/
31
reference_url https://usn.ubuntu.com/6075-1/
reference_id USN-6075-1
reference_type
scores
url https://usn.ubuntu.com/6075-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-32206
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-43dj-vtap-2qd2
4
url VCID-4g3s-bh4t-qqhc
vulnerability_id VCID-4g3s-bh4t-qqhc
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6867.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6867.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6867
reference_id
reference_type
scores
0
value 0.00857
scoring_system epss
scoring_elements 0.75021
published_at 2026-04-21T12:55:00Z
1
value 0.00931
scoring_system epss
scoring_elements 0.7608
published_at 2026-04-04T12:55:00Z
2
value 0.00931
scoring_system epss
scoring_elements 0.76048
published_at 2026-04-02T12:55:00Z
3
value 0.00931
scoring_system epss
scoring_elements 0.7606
published_at 2026-04-07T12:55:00Z
4
value 0.00931
scoring_system epss
scoring_elements 0.76093
published_at 2026-04-08T12:55:00Z
5
value 0.00931
scoring_system epss
scoring_elements 0.76107
published_at 2026-04-09T12:55:00Z
6
value 0.00931
scoring_system epss
scoring_elements 0.76132
published_at 2026-04-11T12:55:00Z
7
value 0.00931
scoring_system epss
scoring_elements 0.76108
published_at 2026-04-12T12:55:00Z
8
value 0.00931
scoring_system epss
scoring_elements 0.76106
published_at 2026-04-13T12:55:00Z
9
value 0.00931
scoring_system epss
scoring_elements 0.76147
published_at 2026-04-16T12:55:00Z
10
value 0.00931
scoring_system epss
scoring_elements 0.7615
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6867
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255366
reference_id 2255366
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255366
14
reference_url https://www.debian.org/security/2023/dsa-5581
reference_id dsa-5581
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/
url https://www.debian.org/security/2023/dsa-5581
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-54/
reference_id mfsa2023-54
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/
url https://www.mozilla.org/security/advisories/mfsa2023-54/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
18
reference_url https://www.mozilla.org/security/advisories/mfsa2023-56/
reference_id mfsa2023-56
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/
url https://www.mozilla.org/security/advisories/mfsa2023-56/
19
reference_url https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html
reference_id msg00020.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/
url https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html
20
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
21
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
22
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
23
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
24
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
25
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
26
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
27
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
28
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
29
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1863863
reference_id show_bug.cgi?id=1863863
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1863863
30
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-6867
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4g3s-bh4t-qqhc
5
url VCID-4urd-zjpu-47ed
vulnerability_id VCID-4urd-zjpu-47ed
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6870
reference_id
reference_type
scores
0
value 0.00603
scoring_system epss
scoring_elements 0.69584
published_at 2026-04-21T12:55:00Z
1
value 0.00676
scoring_system epss
scoring_elements 0.71428
published_at 2026-04-02T12:55:00Z
2
value 0.00676
scoring_system epss
scoring_elements 0.71446
published_at 2026-04-04T12:55:00Z
3
value 0.00676
scoring_system epss
scoring_elements 0.71421
published_at 2026-04-07T12:55:00Z
4
value 0.00676
scoring_system epss
scoring_elements 0.71461
published_at 2026-04-13T12:55:00Z
5
value 0.00676
scoring_system epss
scoring_elements 0.71496
published_at 2026-04-11T12:55:00Z
6
value 0.00676
scoring_system epss
scoring_elements 0.7148
published_at 2026-04-12T12:55:00Z
7
value 0.00676
scoring_system epss
scoring_elements 0.71507
published_at 2026-04-16T12:55:00Z
8
value 0.00676
scoring_system epss
scoring_elements 0.71512
published_at 2026-04-18T12:55:00Z
9
value 0.00676
scoring_system epss
scoring_elements 0.71473
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6870
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-6870
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4urd-zjpu-47ed
6
url VCID-4xqc-2rzu-y3aj
vulnerability_id VCID-4xqc-2rzu-y3aj
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6873
reference_id
reference_type
scores
0
value 0.00384
scoring_system epss
scoring_elements 0.59721
published_at 2026-04-21T12:55:00Z
1
value 0.00384
scoring_system epss
scoring_elements 0.59651
published_at 2026-04-02T12:55:00Z
2
value 0.00384
scoring_system epss
scoring_elements 0.59676
published_at 2026-04-04T12:55:00Z
3
value 0.00384
scoring_system epss
scoring_elements 0.59646
published_at 2026-04-07T12:55:00Z
4
value 0.00384
scoring_system epss
scoring_elements 0.59697
published_at 2026-04-08T12:55:00Z
5
value 0.00384
scoring_system epss
scoring_elements 0.59711
published_at 2026-04-09T12:55:00Z
6
value 0.00384
scoring_system epss
scoring_elements 0.5973
published_at 2026-04-11T12:55:00Z
7
value 0.00384
scoring_system epss
scoring_elements 0.59714
published_at 2026-04-12T12:55:00Z
8
value 0.00384
scoring_system epss
scoring_elements 0.59695
published_at 2026-04-13T12:55:00Z
9
value 0.00384
scoring_system epss
scoring_elements 0.59729
published_at 2026-04-16T12:55:00Z
10
value 0.00384
scoring_system epss
scoring_elements 0.59736
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6873
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
13
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-6873
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4xqc-2rzu-y3aj
7
url VCID-4z8m-8jr8-pqh6
vulnerability_id VCID-4z8m-8jr8-pqh6
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32212.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32212.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32212
reference_id
reference_type
scores
0
value 0.00195
scoring_system epss
scoring_elements 0.41406
published_at 2026-04-21T12:55:00Z
1
value 0.00199
scoring_system epss
scoring_elements 0.42034
published_at 2026-04-11T12:55:00Z
2
value 0.00199
scoring_system epss
scoring_elements 0.42025
published_at 2026-04-04T12:55:00Z
3
value 0.00199
scoring_system epss
scoring_elements 0.41951
published_at 2026-04-07T12:55:00Z
4
value 0.00199
scoring_system epss
scoring_elements 0.42001
published_at 2026-04-08T12:55:00Z
5
value 0.00199
scoring_system epss
scoring_elements 0.42012
published_at 2026-04-09T12:55:00Z
6
value 0.00199
scoring_system epss
scoring_elements 0.41997
published_at 2026-04-12T12:55:00Z
7
value 0.00199
scoring_system epss
scoring_elements 0.42005
published_at 2026-04-18T12:55:00Z
8
value 0.00199
scoring_system epss
scoring_elements 0.42031
published_at 2026-04-16T12:55:00Z
9
value 0.00199
scoring_system epss
scoring_elements 0.41983
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32212
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2196741
reference_id 2196741
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2196741
10
reference_url https://security.gentoo.org/glsa/202312-03
reference_id GLSA-202312-03
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:21:37Z/
url https://security.gentoo.org/glsa/202312-03
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
reference_id mfsa2023-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2023-16/
reference_id mfsa2023-16
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:21:37Z/
url https://www.mozilla.org/security/advisories/mfsa2023-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-17
reference_id mfsa2023-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-17/
reference_id mfsa2023-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:21:37Z/
url https://www.mozilla.org/security/advisories/mfsa2023-17/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-18
reference_id mfsa2023-18
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-18
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-18/
reference_id mfsa2023-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:21:37Z/
url https://www.mozilla.org/security/advisories/mfsa2023-18/
17
reference_url https://access.redhat.com/errata/RHSA-2023:3137
reference_id RHSA-2023:3137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3137
18
reference_url https://access.redhat.com/errata/RHSA-2023:3138
reference_id RHSA-2023:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3138
19
reference_url https://access.redhat.com/errata/RHSA-2023:3139
reference_id RHSA-2023:3139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3139
20
reference_url https://access.redhat.com/errata/RHSA-2023:3140
reference_id RHSA-2023:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3140
21
reference_url https://access.redhat.com/errata/RHSA-2023:3141
reference_id RHSA-2023:3141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3141
22
reference_url https://access.redhat.com/errata/RHSA-2023:3142
reference_id RHSA-2023:3142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3142
23
reference_url https://access.redhat.com/errata/RHSA-2023:3143
reference_id RHSA-2023:3143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3143
24
reference_url https://access.redhat.com/errata/RHSA-2023:3149
reference_id RHSA-2023:3149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3149
25
reference_url https://access.redhat.com/errata/RHSA-2023:3150
reference_id RHSA-2023:3150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3150
26
reference_url https://access.redhat.com/errata/RHSA-2023:3151
reference_id RHSA-2023:3151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3151
27
reference_url https://access.redhat.com/errata/RHSA-2023:3152
reference_id RHSA-2023:3152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3152
28
reference_url https://access.redhat.com/errata/RHSA-2023:3153
reference_id RHSA-2023:3153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3153
29
reference_url https://access.redhat.com/errata/RHSA-2023:3154
reference_id RHSA-2023:3154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3154
30
reference_url https://access.redhat.com/errata/RHSA-2023:3155
reference_id RHSA-2023:3155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3155
31
reference_url https://access.redhat.com/errata/RHSA-2023:3220
reference_id RHSA-2023:3220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3220
32
reference_url https://access.redhat.com/errata/RHSA-2023:3221
reference_id RHSA-2023:3221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3221
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1826622
reference_id show_bug.cgi?id=1826622
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:21:37Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1826622
34
reference_url https://usn.ubuntu.com/6074-1/
reference_id USN-6074-1
reference_type
scores
url https://usn.ubuntu.com/6074-1/
35
reference_url https://usn.ubuntu.com/6075-1/
reference_id USN-6075-1
reference_type
scores
url https://usn.ubuntu.com/6075-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-32212
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4z8m-8jr8-pqh6
8
url VCID-5qf5-d44c-t7gu
vulnerability_id VCID-5qf5-d44c-t7gu
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6862.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6862.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6862
reference_id
reference_type
scores
0
value 0.00367
scoring_system epss
scoring_elements 0.58658
published_at 2026-04-08T12:55:00Z
1
value 0.00367
scoring_system epss
scoring_elements 0.58682
published_at 2026-04-11T12:55:00Z
2
value 0.00367
scoring_system epss
scoring_elements 0.58636
published_at 2026-04-04T12:55:00Z
3
value 0.00367
scoring_system epss
scoring_elements 0.58606
published_at 2026-04-07T12:55:00Z
4
value 0.00367
scoring_system epss
scoring_elements 0.58664
published_at 2026-04-09T12:55:00Z
5
value 0.00367
scoring_system epss
scoring_elements 0.58615
published_at 2026-04-02T12:55:00Z
6
value 0.00367
scoring_system epss
scoring_elements 0.5868
published_at 2026-04-18T12:55:00Z
7
value 0.00367
scoring_system epss
scoring_elements 0.58675
published_at 2026-04-16T12:55:00Z
8
value 0.00367
scoring_system epss
scoring_elements 0.58643
published_at 2026-04-13T12:55:00Z
9
value 0.00367
scoring_system epss
scoring_elements 0.58663
published_at 2026-04-12T12:55:00Z
10
value 0.00441
scoring_system epss
scoring_elements 0.63264
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6862
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255368
reference_id 2255368
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255368
17
reference_url https://www.debian.org/security/2023/dsa-5581
reference_id dsa-5581
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/
url https://www.debian.org/security/2023/dsa-5581
18
reference_url https://www.debian.org/security/2023/dsa-5582
reference_id dsa-5582
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/
url https://www.debian.org/security/2023/dsa-5582
19
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
21
reference_url https://www.mozilla.org/security/advisories/mfsa2023-54/
reference_id mfsa2023-54
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/
url https://www.mozilla.org/security/advisories/mfsa2023-54/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
23
reference_url https://www.mozilla.org/security/advisories/mfsa2023-55/
reference_id mfsa2023-55
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/
url https://www.mozilla.org/security/advisories/mfsa2023-55/
24
reference_url https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html
reference_id msg00020.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/
url https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html
25
reference_url https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/
url https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html
26
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
27
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
28
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
29
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
30
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
31
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
32
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
33
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
34
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
35
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
36
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
37
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
38
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
39
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
40
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
41
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
42
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
43
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
44
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1868042
reference_id show_bug.cgi?id=1868042
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1868042
45
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-6862
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5qf5-d44c-t7gu
9
url VCID-697p-cpq8-1qax
vulnerability_id VCID-697p-cpq8-1qax
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32205.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32205.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32205
reference_id
reference_type
scores
0
value 0.00195
scoring_system epss
scoring_elements 0.41406
published_at 2026-04-21T12:55:00Z
1
value 0.00199
scoring_system epss
scoring_elements 0.42001
published_at 2026-04-08T12:55:00Z
2
value 0.00199
scoring_system epss
scoring_elements 0.41983
published_at 2026-04-13T12:55:00Z
3
value 0.00199
scoring_system epss
scoring_elements 0.42031
published_at 2026-04-16T12:55:00Z
4
value 0.00199
scoring_system epss
scoring_elements 0.42005
published_at 2026-04-18T12:55:00Z
5
value 0.00199
scoring_system epss
scoring_elements 0.41997
published_at 2026-04-12T12:55:00Z
6
value 0.00199
scoring_system epss
scoring_elements 0.42025
published_at 2026-04-04T12:55:00Z
7
value 0.00199
scoring_system epss
scoring_elements 0.41951
published_at 2026-04-07T12:55:00Z
8
value 0.00199
scoring_system epss
scoring_elements 0.42012
published_at 2026-04-09T12:55:00Z
9
value 0.00199
scoring_system epss
scoring_elements 0.42034
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32205
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2196736
reference_id 2196736
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2196736
10
reference_url https://security.gentoo.org/glsa/202312-03
reference_id GLSA-202312-03
reference_type
scores
url https://security.gentoo.org/glsa/202312-03
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
reference_id mfsa2023-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-17
reference_id mfsa2023-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-17
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-18
reference_id mfsa2023-18
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-18
14
reference_url https://access.redhat.com/errata/RHSA-2023:3137
reference_id RHSA-2023:3137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3137
15
reference_url https://access.redhat.com/errata/RHSA-2023:3138
reference_id RHSA-2023:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3138
16
reference_url https://access.redhat.com/errata/RHSA-2023:3139
reference_id RHSA-2023:3139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3139
17
reference_url https://access.redhat.com/errata/RHSA-2023:3140
reference_id RHSA-2023:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3140
18
reference_url https://access.redhat.com/errata/RHSA-2023:3141
reference_id RHSA-2023:3141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3141
19
reference_url https://access.redhat.com/errata/RHSA-2023:3142
reference_id RHSA-2023:3142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3142
20
reference_url https://access.redhat.com/errata/RHSA-2023:3143
reference_id RHSA-2023:3143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3143
21
reference_url https://access.redhat.com/errata/RHSA-2023:3149
reference_id RHSA-2023:3149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3149
22
reference_url https://access.redhat.com/errata/RHSA-2023:3150
reference_id RHSA-2023:3150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3150
23
reference_url https://access.redhat.com/errata/RHSA-2023:3151
reference_id RHSA-2023:3151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3151
24
reference_url https://access.redhat.com/errata/RHSA-2023:3152
reference_id RHSA-2023:3152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3152
25
reference_url https://access.redhat.com/errata/RHSA-2023:3153
reference_id RHSA-2023:3153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3153
26
reference_url https://access.redhat.com/errata/RHSA-2023:3154
reference_id RHSA-2023:3154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3154
27
reference_url https://access.redhat.com/errata/RHSA-2023:3155
reference_id RHSA-2023:3155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3155
28
reference_url https://access.redhat.com/errata/RHSA-2023:3220
reference_id RHSA-2023:3220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3220
29
reference_url https://access.redhat.com/errata/RHSA-2023:3221
reference_id RHSA-2023:3221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3221
30
reference_url https://usn.ubuntu.com/6074-1/
reference_id USN-6074-1
reference_type
scores
url https://usn.ubuntu.com/6074-1/
31
reference_url https://usn.ubuntu.com/6075-1/
reference_id USN-6075-1
reference_type
scores
url https://usn.ubuntu.com/6075-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-32205
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-697p-cpq8-1qax
10
url VCID-6q8f-csj4-vkhb
vulnerability_id VCID-6q8f-csj4-vkhb
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5723
reference_id
reference_type
scores
0
value 0.00218
scoring_system epss
scoring_elements 0.4432
published_at 2026-04-21T12:55:00Z
1
value 0.00218
scoring_system epss
scoring_elements 0.44344
published_at 2026-04-13T12:55:00Z
2
value 0.00218
scoring_system epss
scoring_elements 0.44366
published_at 2026-04-04T12:55:00Z
3
value 0.00218
scoring_system epss
scoring_elements 0.44303
published_at 2026-04-07T12:55:00Z
4
value 0.00218
scoring_system epss
scoring_elements 0.44354
published_at 2026-04-08T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.4436
published_at 2026-04-09T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.44377
published_at 2026-04-11T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44345
published_at 2026-04-12T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.444
published_at 2026-04-16T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.44391
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5723
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-45
reference_id mfsa2023-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-45
2
reference_url https://usn.ubuntu.com/6456-1/
reference_id USN-6456-1
reference_type
scores
url https://usn.ubuntu.com/6456-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-5723
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6q8f-csj4-vkhb
11
url VCID-7hye-1c3x-cubf
vulnerability_id VCID-7hye-1c3x-cubf
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4058
reference_id
reference_type
scores
0
value 0.00307
scoring_system epss
scoring_elements 0.53912
published_at 2026-04-21T12:55:00Z
1
value 0.00307
scoring_system epss
scoring_elements 0.53822
published_at 2026-04-02T12:55:00Z
2
value 0.00307
scoring_system epss
scoring_elements 0.53849
published_at 2026-04-04T12:55:00Z
3
value 0.00307
scoring_system epss
scoring_elements 0.53823
published_at 2026-04-07T12:55:00Z
4
value 0.00307
scoring_system epss
scoring_elements 0.53875
published_at 2026-04-08T12:55:00Z
5
value 0.00307
scoring_system epss
scoring_elements 0.53873
published_at 2026-04-09T12:55:00Z
6
value 0.00307
scoring_system epss
scoring_elements 0.53921
published_at 2026-04-11T12:55:00Z
7
value 0.00307
scoring_system epss
scoring_elements 0.53903
published_at 2026-04-12T12:55:00Z
8
value 0.00307
scoring_system epss
scoring_elements 0.53887
published_at 2026-04-13T12:55:00Z
9
value 0.00307
scoring_system epss
scoring_elements 0.53925
published_at 2026-04-16T12:55:00Z
10
value 0.00307
scoring_system epss
scoring_elements 0.53931
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4058
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
2
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-4058
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7hye-1c3x-cubf
12
url VCID-8243-6pew-wuaj
vulnerability_id VCID-8243-6pew-wuaj
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34415
reference_id
reference_type
scores
0
value 0.00105
scoring_system epss
scoring_elements 0.28645
published_at 2026-04-12T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28598
published_at 2026-04-13T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28727
published_at 2026-04-02T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28774
published_at 2026-04-04T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28582
published_at 2026-04-07T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28647
published_at 2026-04-08T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28688
published_at 2026-04-09T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28689
published_at 2026-04-11T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29711
published_at 2026-04-21T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29777
published_at 2026-04-16T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.29755
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34415
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-20
reference_id mfsa2023-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-20
3
reference_url https://usn.ubuntu.com/6143-1/
reference_id USN-6143-1
reference_type
scores
url https://usn.ubuntu.com/6143-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-34415
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8243-6pew-wuaj
13
url VCID-8h3r-nznt-jff7
vulnerability_id VCID-8h3r-nznt-jff7
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5175
reference_id
reference_type
scores
0
value 0.00365
scoring_system epss
scoring_elements 0.58578
published_at 2026-04-18T12:55:00Z
1
value 0.00365
scoring_system epss
scoring_elements 0.58514
published_at 2026-04-02T12:55:00Z
2
value 0.00365
scoring_system epss
scoring_elements 0.58504
published_at 2026-04-07T12:55:00Z
3
value 0.00365
scoring_system epss
scoring_elements 0.58556
published_at 2026-04-21T12:55:00Z
4
value 0.00365
scoring_system epss
scoring_elements 0.58563
published_at 2026-04-09T12:55:00Z
5
value 0.00365
scoring_system epss
scoring_elements 0.58579
published_at 2026-04-11T12:55:00Z
6
value 0.00365
scoring_system epss
scoring_elements 0.58559
published_at 2026-04-12T12:55:00Z
7
value 0.00365
scoring_system epss
scoring_elements 0.58539
published_at 2026-04-13T12:55:00Z
8
value 0.00365
scoring_system epss
scoring_elements 0.58574
published_at 2026-04-16T12:55:00Z
9
value 0.00365
scoring_system epss
scoring_elements 0.58534
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5175
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
reference_id mfsa2023-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
2
reference_url https://www.mozilla.org/security/advisories/mfsa2023-41/
reference_id mfsa2023-41
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:03Z/
url https://www.mozilla.org/security/advisories/mfsa2023-41/
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1849704
reference_id show_bug.cgi?id=1849704
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:03Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1849704
4
reference_url https://usn.ubuntu.com/6404-1/
reference_id USN-6404-1
reference_type
scores
url https://usn.ubuntu.com/6404-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-5175
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8h3r-nznt-jff7
14
url VCID-8r1a-6vz3-r3a9
vulnerability_id VCID-8r1a-6vz3-r3a9
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-37212
reference_id
reference_type
scores
0
value 0.00311
scoring_system epss
scoring_elements 0.54286
published_at 2026-04-18T12:55:00Z
1
value 0.00311
scoring_system epss
scoring_elements 0.54179
published_at 2026-04-02T12:55:00Z
2
value 0.00311
scoring_system epss
scoring_elements 0.54209
published_at 2026-04-04T12:55:00Z
3
value 0.00311
scoring_system epss
scoring_elements 0.54184
published_at 2026-04-07T12:55:00Z
4
value 0.00311
scoring_system epss
scoring_elements 0.54237
published_at 2026-04-08T12:55:00Z
5
value 0.00311
scoring_system epss
scoring_elements 0.54233
published_at 2026-04-09T12:55:00Z
6
value 0.00311
scoring_system epss
scoring_elements 0.54282
published_at 2026-04-16T12:55:00Z
7
value 0.00311
scoring_system epss
scoring_elements 0.54265
published_at 2026-04-21T12:55:00Z
8
value 0.00311
scoring_system epss
scoring_elements 0.54243
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-37212
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
reference_id mfsa2023-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
2
reference_url https://usn.ubuntu.com/6201-1/
reference_id USN-6201-1
reference_type
scores
url https://usn.ubuntu.com/6201-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-37212
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8r1a-6vz3-r3a9
15
url VCID-9saf-1zax-5ycy
vulnerability_id VCID-9saf-1zax-5ycy
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6865.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6865.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6865
reference_id
reference_type
scores
0
value 0.00414
scoring_system epss
scoring_elements 0.61565
published_at 2026-04-21T12:55:00Z
1
value 0.00682
scoring_system epss
scoring_elements 0.7159
published_at 2026-04-04T12:55:00Z
2
value 0.00682
scoring_system epss
scoring_elements 0.71563
published_at 2026-04-07T12:55:00Z
3
value 0.00682
scoring_system epss
scoring_elements 0.71603
published_at 2026-04-08T12:55:00Z
4
value 0.00682
scoring_system epss
scoring_elements 0.71614
published_at 2026-04-09T12:55:00Z
5
value 0.00682
scoring_system epss
scoring_elements 0.71572
published_at 2026-04-02T12:55:00Z
6
value 0.00682
scoring_system epss
scoring_elements 0.71647
published_at 2026-04-16T12:55:00Z
7
value 0.00682
scoring_system epss
scoring_elements 0.71652
published_at 2026-04-18T12:55:00Z
8
value 0.00682
scoring_system epss
scoring_elements 0.71637
published_at 2026-04-11T12:55:00Z
9
value 0.00682
scoring_system epss
scoring_elements 0.71621
published_at 2026-04-12T12:55:00Z
10
value 0.00682
scoring_system epss
scoring_elements 0.71602
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6865
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255361
reference_id 2255361
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255361
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
16
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
17
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
18
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
19
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
20
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
21
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
22
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
23
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
24
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
25
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-6865
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9saf-1zax-5ycy
16
url VCID-9the-k9nt-4bdg
vulnerability_id VCID-9the-k9nt-4bdg
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34416.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34416.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34416
reference_id
reference_type
scores
0
value 0.00258
scoring_system epss
scoring_elements 0.49222
published_at 2026-04-11T12:55:00Z
1
value 0.00258
scoring_system epss
scoring_elements 0.49204
published_at 2026-04-09T12:55:00Z
2
value 0.00258
scoring_system epss
scoring_elements 0.49195
published_at 2026-04-12T12:55:00Z
3
value 0.00258
scoring_system epss
scoring_elements 0.49199
published_at 2026-04-13T12:55:00Z
4
value 0.00258
scoring_system epss
scoring_elements 0.49174
published_at 2026-04-02T12:55:00Z
5
value 0.00258
scoring_system epss
scoring_elements 0.49202
published_at 2026-04-04T12:55:00Z
6
value 0.00258
scoring_system epss
scoring_elements 0.49153
published_at 2026-04-07T12:55:00Z
7
value 0.00258
scoring_system epss
scoring_elements 0.49208
published_at 2026-04-08T12:55:00Z
8
value 0.00276
scoring_system epss
scoring_elements 0.5106
published_at 2026-04-16T12:55:00Z
9
value 0.00276
scoring_system epss
scoring_elements 0.51067
published_at 2026-04-18T12:55:00Z
10
value 0.00303
scoring_system epss
scoring_elements 0.53604
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34416
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34416
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34416
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2212842
reference_id 2212842
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2212842
6
reference_url https://security.gentoo.org/glsa/202312-03
reference_id GLSA-202312-03
reference_type
scores
url https://security.gentoo.org/glsa/202312-03
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-19
reference_id mfsa2023-19
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-19
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-20
reference_id mfsa2023-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-20
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-21
reference_id mfsa2023-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-21
10
reference_url https://access.redhat.com/errata/RHSA-2023:3560
reference_id RHSA-2023:3560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3560
11
reference_url https://access.redhat.com/errata/RHSA-2023:3561
reference_id RHSA-2023:3561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3561
12
reference_url https://access.redhat.com/errata/RHSA-2023:3562
reference_id RHSA-2023:3562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3562
13
reference_url https://access.redhat.com/errata/RHSA-2023:3563
reference_id RHSA-2023:3563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3563
14
reference_url https://access.redhat.com/errata/RHSA-2023:3564
reference_id RHSA-2023:3564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3564
15
reference_url https://access.redhat.com/errata/RHSA-2023:3565
reference_id RHSA-2023:3565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3565
16
reference_url https://access.redhat.com/errata/RHSA-2023:3566
reference_id RHSA-2023:3566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3566
17
reference_url https://access.redhat.com/errata/RHSA-2023:3567
reference_id RHSA-2023:3567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3567
18
reference_url https://access.redhat.com/errata/RHSA-2023:3578
reference_id RHSA-2023:3578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3578
19
reference_url https://access.redhat.com/errata/RHSA-2023:3579
reference_id RHSA-2023:3579
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3579
20
reference_url https://access.redhat.com/errata/RHSA-2023:3587
reference_id RHSA-2023:3587
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3587
21
reference_url https://access.redhat.com/errata/RHSA-2023:3588
reference_id RHSA-2023:3588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3588
22
reference_url https://access.redhat.com/errata/RHSA-2023:3589
reference_id RHSA-2023:3589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3589
23
reference_url https://access.redhat.com/errata/RHSA-2023:3590
reference_id RHSA-2023:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3590
24
reference_url https://access.redhat.com/errata/RHSA-2023:3596
reference_id RHSA-2023:3596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3596
25
reference_url https://access.redhat.com/errata/RHSA-2023:3597
reference_id RHSA-2023:3597
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3597
26
reference_url https://usn.ubuntu.com/6143-1/
reference_id USN-6143-1
reference_type
scores
url https://usn.ubuntu.com/6143-1/
27
reference_url https://usn.ubuntu.com/6147-1/
reference_id USN-6147-1
reference_type
scores
url https://usn.ubuntu.com/6147-1/
28
reference_url https://usn.ubuntu.com/6214-1/
reference_id USN-6214-1
reference_type
scores
url https://usn.ubuntu.com/6214-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-34416
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9the-k9nt-4bdg
17
url VCID-9z3s-qfbc-vbdc
vulnerability_id VCID-9z3s-qfbc-vbdc
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6859.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6859.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6859
reference_id
reference_type
scores
0
value 0.00375
scoring_system epss
scoring_elements 0.59175
published_at 2026-04-21T12:55:00Z
1
value 0.00449
scoring_system epss
scoring_elements 0.63625
published_at 2026-04-08T12:55:00Z
2
value 0.00449
scoring_system epss
scoring_elements 0.63608
published_at 2026-04-13T12:55:00Z
3
value 0.00449
scoring_system epss
scoring_elements 0.63645
published_at 2026-04-16T12:55:00Z
4
value 0.00449
scoring_system epss
scoring_elements 0.63654
published_at 2026-04-18T12:55:00Z
5
value 0.00449
scoring_system epss
scoring_elements 0.63583
published_at 2026-04-02T12:55:00Z
6
value 0.00449
scoring_system epss
scoring_elements 0.63609
published_at 2026-04-04T12:55:00Z
7
value 0.00449
scoring_system epss
scoring_elements 0.63573
published_at 2026-04-07T12:55:00Z
8
value 0.00449
scoring_system epss
scoring_elements 0.63641
published_at 2026-04-12T12:55:00Z
9
value 0.00449
scoring_system epss
scoring_elements 0.63656
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6859
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255364
reference_id 2255364
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255364
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-6859
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9z3s-qfbc-vbdc
18
url VCID-a2as-nfu2-ykax
vulnerability_id VCID-a2as-nfu2-ykax
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32214.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32214.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32214
reference_id
reference_type
scores
0
value 0.00229
scoring_system epss
scoring_elements 0.45719
published_at 2026-04-12T12:55:00Z
1
value 0.00229
scoring_system epss
scoring_elements 0.45749
published_at 2026-04-11T12:55:00Z
2
value 0.00229
scoring_system epss
scoring_elements 0.45731
published_at 2026-04-08T12:55:00Z
3
value 0.00229
scoring_system epss
scoring_elements 0.45707
published_at 2026-04-02T12:55:00Z
4
value 0.00229
scoring_system epss
scoring_elements 0.45727
published_at 2026-04-13T12:55:00Z
5
value 0.00229
scoring_system epss
scoring_elements 0.45675
published_at 2026-04-07T12:55:00Z
6
value 0.00244
scoring_system epss
scoring_elements 0.47731
published_at 2026-04-21T12:55:00Z
7
value 0.00244
scoring_system epss
scoring_elements 0.47787
published_at 2026-04-16T12:55:00Z
8
value 0.00244
scoring_system epss
scoring_elements 0.4778
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32214
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2196743
reference_id 2196743
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2196743
3
reference_url https://security.gentoo.org/glsa/202312-03
reference_id GLSA-202312-03
reference_type
scores
url https://security.gentoo.org/glsa/202312-03
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
reference_id mfsa2023-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-17
reference_id mfsa2023-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-17
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-18
reference_id mfsa2023-18
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-18
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-32214
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a2as-nfu2-ykax
19
url VCID-a3g7-atnx-jyg4
vulnerability_id VCID-a3g7-atnx-jyg4
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6869
reference_id
reference_type
scores
0
value 0.00183
scoring_system epss
scoring_elements 0.39963
published_at 2026-04-21T12:55:00Z
1
value 0.00183
scoring_system epss
scoring_elements 0.40051
published_at 2026-04-02T12:55:00Z
2
value 0.00183
scoring_system epss
scoring_elements 0.40052
published_at 2026-04-08T12:55:00Z
3
value 0.00183
scoring_system epss
scoring_elements 0.40066
published_at 2026-04-09T12:55:00Z
4
value 0.00183
scoring_system epss
scoring_elements 0.40077
published_at 2026-04-11T12:55:00Z
5
value 0.00183
scoring_system epss
scoring_elements 0.4004
published_at 2026-04-12T12:55:00Z
6
value 0.00183
scoring_system epss
scoring_elements 0.40021
published_at 2026-04-13T12:55:00Z
7
value 0.00183
scoring_system epss
scoring_elements 0.4007
published_at 2026-04-16T12:55:00Z
8
value 0.00183
scoring_system epss
scoring_elements 0.40041
published_at 2026-04-18T12:55:00Z
9
value 0.00183
scoring_system epss
scoring_elements 0.40078
published_at 2026-04-04T12:55:00Z
10
value 0.00183
scoring_system epss
scoring_elements 0.39999
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6869
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
2
reference_url https://www.mozilla.org/security/advisories/mfsa2023-56/
reference_id mfsa2023-56
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-07T20:22:28Z/
url https://www.mozilla.org/security/advisories/mfsa2023-56/
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1799036
reference_id show_bug.cgi?id=1799036
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-07T20:22:28Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1799036
4
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-6869
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a3g7-atnx-jyg4
20
url VCID-a9j8-ync3-jfgy
vulnerability_id VCID-a9j8-ync3-jfgy
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5758
reference_id
reference_type
scores
0
value 0.00297
scoring_system epss
scoring_elements 0.53144
published_at 2026-04-21T12:55:00Z
1
value 0.00297
scoring_system epss
scoring_elements 0.53057
published_at 2026-04-02T12:55:00Z
2
value 0.00297
scoring_system epss
scoring_elements 0.53101
published_at 2026-04-08T12:55:00Z
3
value 0.00297
scoring_system epss
scoring_elements 0.53094
published_at 2026-04-09T12:55:00Z
4
value 0.00297
scoring_system epss
scoring_elements 0.53145
published_at 2026-04-11T12:55:00Z
5
value 0.00297
scoring_system epss
scoring_elements 0.5313
published_at 2026-04-12T12:55:00Z
6
value 0.00297
scoring_system epss
scoring_elements 0.53113
published_at 2026-04-13T12:55:00Z
7
value 0.00297
scoring_system epss
scoring_elements 0.53154
published_at 2026-04-16T12:55:00Z
8
value 0.00297
scoring_system epss
scoring_elements 0.53162
published_at 2026-04-18T12:55:00Z
9
value 0.00297
scoring_system epss
scoring_elements 0.53082
published_at 2026-04-04T12:55:00Z
10
value 0.00297
scoring_system epss
scoring_elements 0.5305
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5758
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-48
reference_id mfsa2023-48
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-48
2
reference_url https://www.mozilla.org/security/advisories/mfsa2023-48/
reference_id mfsa2023-48
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-12T14:59:16Z/
url https://www.mozilla.org/security/advisories/mfsa2023-48/
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1850019
reference_id show_bug.cgi?id=1850019
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-12T14:59:16Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1850019
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-5758
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a9j8-ync3-jfgy
21
url VCID-avqy-uk9j-2kev
vulnerability_id VCID-avqy-uk9j-2kev
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-37209
reference_id
reference_type
scores
0
value 0.00304
scoring_system epss
scoring_elements 0.537
published_at 2026-04-21T12:55:00Z
1
value 0.00304
scoring_system epss
scoring_elements 0.53615
published_at 2026-04-02T12:55:00Z
2
value 0.00304
scoring_system epss
scoring_elements 0.53643
published_at 2026-04-04T12:55:00Z
3
value 0.00304
scoring_system epss
scoring_elements 0.53611
published_at 2026-04-07T12:55:00Z
4
value 0.00304
scoring_system epss
scoring_elements 0.53662
published_at 2026-04-08T12:55:00Z
5
value 0.00304
scoring_system epss
scoring_elements 0.5366
published_at 2026-04-09T12:55:00Z
6
value 0.00304
scoring_system epss
scoring_elements 0.53709
published_at 2026-04-11T12:55:00Z
7
value 0.00304
scoring_system epss
scoring_elements 0.53692
published_at 2026-04-12T12:55:00Z
8
value 0.00304
scoring_system epss
scoring_elements 0.53676
published_at 2026-04-13T12:55:00Z
9
value 0.00304
scoring_system epss
scoring_elements 0.53713
published_at 2026-04-16T12:55:00Z
10
value 0.00304
scoring_system epss
scoring_elements 0.53718
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-37209
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
reference_id mfsa2023-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
2
reference_url https://usn.ubuntu.com/6201-1/
reference_id USN-6201-1
reference_type
scores
url https://usn.ubuntu.com/6201-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-37209
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-avqy-uk9j-2kev
22
url VCID-azpr-25fb-5qba
vulnerability_id VCID-azpr-25fb-5qba
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6871
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.3782
published_at 2026-04-21T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37936
published_at 2026-04-02T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37962
published_at 2026-04-04T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37839
published_at 2026-04-07T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37889
published_at 2026-04-08T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37902
published_at 2026-04-16T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37917
published_at 2026-04-11T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37881
published_at 2026-04-12T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37856
published_at 2026-04-13T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37882
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6871
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
2
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-6871
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-azpr-25fb-5qba
23
url VCID-brmh-yppw-tqbh
vulnerability_id VCID-brmh-yppw-tqbh
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34417
reference_id
reference_type
scores
0
value 0.00384
scoring_system epss
scoring_elements 0.59671
published_at 2026-04-12T12:55:00Z
1
value 0.00384
scoring_system epss
scoring_elements 0.59652
published_at 2026-04-13T12:55:00Z
2
value 0.00384
scoring_system epss
scoring_elements 0.5961
published_at 2026-04-02T12:55:00Z
3
value 0.00384
scoring_system epss
scoring_elements 0.59635
published_at 2026-04-04T12:55:00Z
4
value 0.00384
scoring_system epss
scoring_elements 0.59605
published_at 2026-04-07T12:55:00Z
5
value 0.00384
scoring_system epss
scoring_elements 0.59656
published_at 2026-04-08T12:55:00Z
6
value 0.00384
scoring_system epss
scoring_elements 0.59669
published_at 2026-04-09T12:55:00Z
7
value 0.00384
scoring_system epss
scoring_elements 0.59688
published_at 2026-04-11T12:55:00Z
8
value 0.00409
scoring_system epss
scoring_elements 0.61305
published_at 2026-04-21T12:55:00Z
9
value 0.00409
scoring_system epss
scoring_elements 0.6132
published_at 2026-04-16T12:55:00Z
10
value 0.00409
scoring_system epss
scoring_elements 0.61325
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34417
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-20
reference_id mfsa2023-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-20
3
reference_url https://usn.ubuntu.com/6143-1/
reference_id USN-6143-1
reference_type
scores
url https://usn.ubuntu.com/6143-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-34417
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-brmh-yppw-tqbh
24
url VCID-bw96-5g6y-j3c4
vulnerability_id VCID-bw96-5g6y-j3c4
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6860.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6860.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6860
reference_id
reference_type
scores
0
value 0.00449
scoring_system epss
scoring_elements 0.63638
published_at 2026-04-21T12:55:00Z
1
value 0.00471
scoring_system epss
scoring_elements 0.64619
published_at 2026-04-08T12:55:00Z
2
value 0.00471
scoring_system epss
scoring_elements 0.64612
published_at 2026-04-13T12:55:00Z
3
value 0.00471
scoring_system epss
scoring_elements 0.64648
published_at 2026-04-16T12:55:00Z
4
value 0.00471
scoring_system epss
scoring_elements 0.64659
published_at 2026-04-18T12:55:00Z
5
value 0.00471
scoring_system epss
scoring_elements 0.64584
published_at 2026-04-02T12:55:00Z
6
value 0.00471
scoring_system epss
scoring_elements 0.64613
published_at 2026-04-04T12:55:00Z
7
value 0.00471
scoring_system epss
scoring_elements 0.64571
published_at 2026-04-07T12:55:00Z
8
value 0.00471
scoring_system epss
scoring_elements 0.64636
published_at 2026-04-09T12:55:00Z
9
value 0.00471
scoring_system epss
scoring_elements 0.64653
published_at 2026-04-11T12:55:00Z
10
value 0.00471
scoring_system epss
scoring_elements 0.6464
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6860
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255365
reference_id 2255365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255365
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-6860
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bw96-5g6y-j3c4
25
url VCID-cr2w-ffbf-rfdu
vulnerability_id VCID-cr2w-ffbf-rfdu
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5729
reference_id
reference_type
scores
0
value 0.00159
scoring_system epss
scoring_elements 0.36777
published_at 2026-04-21T12:55:00Z
1
value 0.00159
scoring_system epss
scoring_elements 0.36927
published_at 2026-04-02T12:55:00Z
2
value 0.00159
scoring_system epss
scoring_elements 0.36959
published_at 2026-04-04T12:55:00Z
3
value 0.00159
scoring_system epss
scoring_elements 0.36791
published_at 2026-04-07T12:55:00Z
4
value 0.00159
scoring_system epss
scoring_elements 0.36842
published_at 2026-04-08T12:55:00Z
5
value 0.00159
scoring_system epss
scoring_elements 0.36858
published_at 2026-04-09T12:55:00Z
6
value 0.00159
scoring_system epss
scoring_elements 0.36866
published_at 2026-04-11T12:55:00Z
7
value 0.00159
scoring_system epss
scoring_elements 0.36831
published_at 2026-04-12T12:55:00Z
8
value 0.00159
scoring_system epss
scoring_elements 0.36806
published_at 2026-04-13T12:55:00Z
9
value 0.00159
scoring_system epss
scoring_elements 0.36852
published_at 2026-04-16T12:55:00Z
10
value 0.00159
scoring_system epss
scoring_elements 0.36835
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5729
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-45
reference_id mfsa2023-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-45
2
reference_url https://usn.ubuntu.com/6456-1/
reference_id USN-6456-1
reference_type
scores
url https://usn.ubuntu.com/6456-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-5729
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cr2w-ffbf-rfdu
26
url VCID-e48r-fz4d-77c3
vulnerability_id VCID-e48r-fz4d-77c3
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-37203
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18082
published_at 2026-04-21T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18292
published_at 2026-04-02T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18129
published_at 2026-04-08T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18184
published_at 2026-04-09T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18189
published_at 2026-04-11T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18142
published_at 2026-04-12T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18093
published_at 2026-04-13T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18035
published_at 2026-04-16T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18048
published_at 2026-04-18T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18343
published_at 2026-04-04T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18045
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-37203
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
reference_id mfsa2023-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
2
reference_url https://www.mozilla.org/security/advisories/mfsa2023-22/
reference_id mfsa2023-22
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:50Z/
url https://www.mozilla.org/security/advisories/mfsa2023-22/
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=291640
reference_id show_bug.cgi?id=291640
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:50Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=291640
4
reference_url https://usn.ubuntu.com/6201-1/
reference_id USN-6201-1
reference_type
scores
url https://usn.ubuntu.com/6201-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-37203
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e48r-fz4d-77c3
27
url VCID-f4xy-kftc-mug2
vulnerability_id VCID-f4xy-kftc-mug2
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32207.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32207.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32207
reference_id
reference_type
scores
0
value 0.00265
scoring_system epss
scoring_elements 0.50048
published_at 2026-04-18T12:55:00Z
1
value 0.00265
scoring_system epss
scoring_elements 0.50046
published_at 2026-04-16T12:55:00Z
2
value 0.00265
scoring_system epss
scoring_elements 0.5
published_at 2026-04-13T12:55:00Z
3
value 0.00265
scoring_system epss
scoring_elements 0.49987
published_at 2026-04-02T12:55:00Z
4
value 0.00265
scoring_system epss
scoring_elements 0.50015
published_at 2026-04-04T12:55:00Z
5
value 0.00265
scoring_system epss
scoring_elements 0.50031
published_at 2026-04-11T12:55:00Z
6
value 0.00265
scoring_system epss
scoring_elements 0.50014
published_at 2026-04-09T12:55:00Z
7
value 0.00265
scoring_system epss
scoring_elements 0.5002
published_at 2026-04-21T12:55:00Z
8
value 0.00265
scoring_system epss
scoring_elements 0.49966
published_at 2026-04-07T12:55:00Z
9
value 0.00265
scoring_system epss
scoring_elements 0.50004
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32207
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2196738
reference_id 2196738
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2196738
10
reference_url https://security.gentoo.org/glsa/202312-03
reference_id GLSA-202312-03
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-31T15:11:27Z/
url https://security.gentoo.org/glsa/202312-03
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
reference_id mfsa2023-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2023-16/
reference_id mfsa2023-16
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-31T15:11:27Z/
url https://www.mozilla.org/security/advisories/mfsa2023-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-17
reference_id mfsa2023-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-17/
reference_id mfsa2023-17
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-31T15:11:27Z/
url https://www.mozilla.org/security/advisories/mfsa2023-17/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-18
reference_id mfsa2023-18
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-18
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-18/
reference_id mfsa2023-18
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-31T15:11:27Z/
url https://www.mozilla.org/security/advisories/mfsa2023-18/
17
reference_url https://access.redhat.com/errata/RHSA-2023:3137
reference_id RHSA-2023:3137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3137
18
reference_url https://access.redhat.com/errata/RHSA-2023:3138
reference_id RHSA-2023:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3138
19
reference_url https://access.redhat.com/errata/RHSA-2023:3139
reference_id RHSA-2023:3139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3139
20
reference_url https://access.redhat.com/errata/RHSA-2023:3140
reference_id RHSA-2023:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3140
21
reference_url https://access.redhat.com/errata/RHSA-2023:3141
reference_id RHSA-2023:3141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3141
22
reference_url https://access.redhat.com/errata/RHSA-2023:3142
reference_id RHSA-2023:3142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3142
23
reference_url https://access.redhat.com/errata/RHSA-2023:3143
reference_id RHSA-2023:3143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3143
24
reference_url https://access.redhat.com/errata/RHSA-2023:3149
reference_id RHSA-2023:3149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3149
25
reference_url https://access.redhat.com/errata/RHSA-2023:3150
reference_id RHSA-2023:3150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3150
26
reference_url https://access.redhat.com/errata/RHSA-2023:3151
reference_id RHSA-2023:3151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3151
27
reference_url https://access.redhat.com/errata/RHSA-2023:3152
reference_id RHSA-2023:3152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3152
28
reference_url https://access.redhat.com/errata/RHSA-2023:3153
reference_id RHSA-2023:3153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3153
29
reference_url https://access.redhat.com/errata/RHSA-2023:3154
reference_id RHSA-2023:3154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3154
30
reference_url https://access.redhat.com/errata/RHSA-2023:3155
reference_id RHSA-2023:3155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3155
31
reference_url https://access.redhat.com/errata/RHSA-2023:3220
reference_id RHSA-2023:3220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3220
32
reference_url https://access.redhat.com/errata/RHSA-2023:3221
reference_id RHSA-2023:3221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3221
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1826116
reference_id show_bug.cgi?id=1826116
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-31T15:11:27Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1826116
34
reference_url https://usn.ubuntu.com/6074-1/
reference_id USN-6074-1
reference_type
scores
url https://usn.ubuntu.com/6074-1/
35
reference_url https://usn.ubuntu.com/6075-1/
reference_id USN-6075-1
reference_type
scores
url https://usn.ubuntu.com/6075-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-32207
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f4xy-kftc-mug2
28
url VCID-f6qv-znt2-2bd5
vulnerability_id VCID-f6qv-znt2-2bd5
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6863.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6863.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6863
reference_id
reference_type
scores
0
value 0.00464
scoring_system epss
scoring_elements 0.6437
published_at 2026-04-21T12:55:00Z
1
value 0.00504
scoring_system epss
scoring_elements 0.66189
published_at 2026-04-08T12:55:00Z
2
value 0.00504
scoring_system epss
scoring_elements 0.66178
published_at 2026-04-13T12:55:00Z
3
value 0.00504
scoring_system epss
scoring_elements 0.66214
published_at 2026-04-16T12:55:00Z
4
value 0.00504
scoring_system epss
scoring_elements 0.66228
published_at 2026-04-18T12:55:00Z
5
value 0.00504
scoring_system epss
scoring_elements 0.66146
published_at 2026-04-02T12:55:00Z
6
value 0.00504
scoring_system epss
scoring_elements 0.66173
published_at 2026-04-04T12:55:00Z
7
value 0.00504
scoring_system epss
scoring_elements 0.66141
published_at 2026-04-07T12:55:00Z
8
value 0.00504
scoring_system epss
scoring_elements 0.66203
published_at 2026-04-09T12:55:00Z
9
value 0.00504
scoring_system epss
scoring_elements 0.66222
published_at 2026-04-11T12:55:00Z
10
value 0.00504
scoring_system epss
scoring_elements 0.66209
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6863
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255369
reference_id 2255369
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255369
14
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
18
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
19
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
20
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
21
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
22
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
23
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
24
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
25
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
26
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
27
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
28
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
29
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
30
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
31
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
32
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
33
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
34
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
35
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
36
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
37
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-6863
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f6qv-znt2-2bd5
29
url VCID-gd3w-dp7g-c7bv
vulnerability_id VCID-gd3w-dp7g-c7bv
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6866
reference_id
reference_type
scores
0
value 0.01258
scoring_system epss
scoring_elements 0.7942
published_at 2026-04-18T12:55:00Z
1
value 0.01258
scoring_system epss
scoring_elements 0.79358
published_at 2026-04-07T12:55:00Z
2
value 0.01258
scoring_system epss
scoring_elements 0.79385
published_at 2026-04-08T12:55:00Z
3
value 0.01258
scoring_system epss
scoring_elements 0.79394
published_at 2026-04-09T12:55:00Z
4
value 0.01258
scoring_system epss
scoring_elements 0.79417
published_at 2026-04-11T12:55:00Z
5
value 0.01258
scoring_system epss
scoring_elements 0.79401
published_at 2026-04-12T12:55:00Z
6
value 0.01258
scoring_system epss
scoring_elements 0.7939
published_at 2026-04-13T12:55:00Z
7
value 0.01258
scoring_system epss
scoring_elements 0.79422
published_at 2026-04-21T12:55:00Z
8
value 0.01258
scoring_system epss
scoring_elements 0.7935
published_at 2026-04-02T12:55:00Z
9
value 0.01258
scoring_system epss
scoring_elements 0.79372
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6866
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
2
reference_url https://www.mozilla.org/security/advisories/mfsa2023-56/
reference_id mfsa2023-56
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-27T18:53:04Z/
url https://www.mozilla.org/security/advisories/mfsa2023-56/
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1849037
reference_id show_bug.cgi?id=1849037
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-27T18:53:04Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1849037
4
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-6866
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gd3w-dp7g-c7bv
30
url VCID-ghqe-gsw9-c3e4
vulnerability_id VCID-ghqe-gsw9-c3e4
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32211.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32211.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32211
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.34991
published_at 2026-04-21T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.35073
published_at 2026-04-11T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.34997
published_at 2026-04-07T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35041
published_at 2026-04-08T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.35069
published_at 2026-04-09T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35038
published_at 2026-04-12T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.3509
published_at 2026-04-02T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.35037
published_at 2026-04-18T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.35052
published_at 2026-04-16T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.35014
published_at 2026-04-13T12:55:00Z
10
value 0.00146
scoring_system epss
scoring_elements 0.35118
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32211
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2196740
reference_id 2196740
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2196740
10
reference_url https://security.gentoo.org/glsa/202312-03
reference_id GLSA-202312-03
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:05Z/
url https://security.gentoo.org/glsa/202312-03
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
reference_id mfsa2023-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
12
reference_url https://www.mozilla.org/security/advisories/mfsa2023-16/
reference_id mfsa2023-16
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:05Z/
url https://www.mozilla.org/security/advisories/mfsa2023-16/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-17
reference_id mfsa2023-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-17
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-17/
reference_id mfsa2023-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:05Z/
url https://www.mozilla.org/security/advisories/mfsa2023-17/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-18
reference_id mfsa2023-18
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-18
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-18/
reference_id mfsa2023-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:05Z/
url https://www.mozilla.org/security/advisories/mfsa2023-18/
17
reference_url https://access.redhat.com/errata/RHSA-2023:3137
reference_id RHSA-2023:3137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3137
18
reference_url https://access.redhat.com/errata/RHSA-2023:3138
reference_id RHSA-2023:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3138
19
reference_url https://access.redhat.com/errata/RHSA-2023:3139
reference_id RHSA-2023:3139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3139
20
reference_url https://access.redhat.com/errata/RHSA-2023:3140
reference_id RHSA-2023:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3140
21
reference_url https://access.redhat.com/errata/RHSA-2023:3141
reference_id RHSA-2023:3141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3141
22
reference_url https://access.redhat.com/errata/RHSA-2023:3142
reference_id RHSA-2023:3142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3142
23
reference_url https://access.redhat.com/errata/RHSA-2023:3143
reference_id RHSA-2023:3143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3143
24
reference_url https://access.redhat.com/errata/RHSA-2023:3149
reference_id RHSA-2023:3149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3149
25
reference_url https://access.redhat.com/errata/RHSA-2023:3150
reference_id RHSA-2023:3150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3150
26
reference_url https://access.redhat.com/errata/RHSA-2023:3151
reference_id RHSA-2023:3151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3151
27
reference_url https://access.redhat.com/errata/RHSA-2023:3152
reference_id RHSA-2023:3152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3152
28
reference_url https://access.redhat.com/errata/RHSA-2023:3153
reference_id RHSA-2023:3153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3153
29
reference_url https://access.redhat.com/errata/RHSA-2023:3154
reference_id RHSA-2023:3154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3154
30
reference_url https://access.redhat.com/errata/RHSA-2023:3155
reference_id RHSA-2023:3155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3155
31
reference_url https://access.redhat.com/errata/RHSA-2023:3220
reference_id RHSA-2023:3220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3220
32
reference_url https://access.redhat.com/errata/RHSA-2023:3221
reference_id RHSA-2023:3221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3221
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1823379
reference_id show_bug.cgi?id=1823379
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:05Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1823379
34
reference_url https://usn.ubuntu.com/6074-1/
reference_id USN-6074-1
reference_type
scores
url https://usn.ubuntu.com/6074-1/
35
reference_url https://usn.ubuntu.com/6075-1/
reference_id USN-6075-1
reference_type
scores
url https://usn.ubuntu.com/6075-1/
36
reference_url https://usn.ubuntu.com/6120-1/
reference_id USN-6120-1
reference_type
scores
url https://usn.ubuntu.com/6120-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-32211
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ghqe-gsw9-c3e4
31
url VCID-hgwp-3pm8-xugw
vulnerability_id VCID-hgwp-3pm8-xugw
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-37205
reference_id
reference_type
scores
0
value 0.00249
scoring_system epss
scoring_elements 0.48168
published_at 2026-04-21T12:55:00Z
1
value 0.00249
scoring_system epss
scoring_elements 0.48139
published_at 2026-04-02T12:55:00Z
2
value 0.00249
scoring_system epss
scoring_elements 0.48159
published_at 2026-04-04T12:55:00Z
3
value 0.00249
scoring_system epss
scoring_elements 0.48109
published_at 2026-04-07T12:55:00Z
4
value 0.00249
scoring_system epss
scoring_elements 0.48162
published_at 2026-04-08T12:55:00Z
5
value 0.00249
scoring_system epss
scoring_elements 0.48157
published_at 2026-04-09T12:55:00Z
6
value 0.00249
scoring_system epss
scoring_elements 0.4818
published_at 2026-04-11T12:55:00Z
7
value 0.00249
scoring_system epss
scoring_elements 0.48153
published_at 2026-04-12T12:55:00Z
8
value 0.00249
scoring_system epss
scoring_elements 0.48164
published_at 2026-04-13T12:55:00Z
9
value 0.00249
scoring_system epss
scoring_elements 0.48217
published_at 2026-04-16T12:55:00Z
10
value 0.00249
scoring_system epss
scoring_elements 0.48212
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-37205
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
reference_id mfsa2023-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
2
reference_url https://usn.ubuntu.com/6201-1/
reference_id USN-6201-1
reference_type
scores
url https://usn.ubuntu.com/6201-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-37205
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hgwp-3pm8-xugw
32
url VCID-kskc-agaw-8bcr
vulnerability_id VCID-kskc-agaw-8bcr
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6857.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6857.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6857
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.40745
published_at 2026-04-18T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40775
published_at 2026-04-16T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40755
published_at 2026-04-02T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40783
published_at 2026-04-11T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40707
published_at 2026-04-07T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40757
published_at 2026-04-08T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.40764
published_at 2026-04-09T12:55:00Z
7
value 0.00189
scoring_system epss
scoring_elements 0.4073
published_at 2026-04-13T12:55:00Z
8
value 0.00189
scoring_system epss
scoring_elements 0.40749
published_at 2026-04-12T12:55:00Z
9
value 0.00227
scoring_system epss
scoring_elements 0.45504
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6857
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255362
reference_id 2255362
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255362
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-6857
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kskc-agaw-8bcr
33
url VCID-ngja-2eff-h7hk
vulnerability_id VCID-ngja-2eff-h7hk
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34414.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34414.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34414
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.14972
published_at 2026-04-21T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18219
published_at 2026-04-08T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18432
published_at 2026-04-04T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18134
published_at 2026-04-07T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18273
published_at 2026-04-09T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18275
published_at 2026-04-11T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18228
published_at 2026-04-12T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18177
published_at 2026-04-13T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18377
published_at 2026-04-02T12:55:00Z
9
value 0.00062
scoring_system epss
scoring_elements 0.19255
published_at 2026-04-16T12:55:00Z
10
value 0.00062
scoring_system epss
scoring_elements 0.19264
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34414
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34416
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34416
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2212841
reference_id 2212841
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2212841
6
reference_url https://security.gentoo.org/glsa/202312-03
reference_id GLSA-202312-03
reference_type
scores
url https://security.gentoo.org/glsa/202312-03
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-19
reference_id mfsa2023-19
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-19
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-20
reference_id mfsa2023-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-20
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-21
reference_id mfsa2023-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-21
10
reference_url https://access.redhat.com/errata/RHSA-2023:3560
reference_id RHSA-2023:3560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3560
11
reference_url https://access.redhat.com/errata/RHSA-2023:3561
reference_id RHSA-2023:3561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3561
12
reference_url https://access.redhat.com/errata/RHSA-2023:3562
reference_id RHSA-2023:3562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3562
13
reference_url https://access.redhat.com/errata/RHSA-2023:3563
reference_id RHSA-2023:3563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3563
14
reference_url https://access.redhat.com/errata/RHSA-2023:3564
reference_id RHSA-2023:3564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3564
15
reference_url https://access.redhat.com/errata/RHSA-2023:3565
reference_id RHSA-2023:3565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3565
16
reference_url https://access.redhat.com/errata/RHSA-2023:3566
reference_id RHSA-2023:3566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3566
17
reference_url https://access.redhat.com/errata/RHSA-2023:3567
reference_id RHSA-2023:3567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3567
18
reference_url https://access.redhat.com/errata/RHSA-2023:3578
reference_id RHSA-2023:3578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3578
19
reference_url https://access.redhat.com/errata/RHSA-2023:3579
reference_id RHSA-2023:3579
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3579
20
reference_url https://access.redhat.com/errata/RHSA-2023:3587
reference_id RHSA-2023:3587
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3587
21
reference_url https://access.redhat.com/errata/RHSA-2023:3588
reference_id RHSA-2023:3588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3588
22
reference_url https://access.redhat.com/errata/RHSA-2023:3589
reference_id RHSA-2023:3589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3589
23
reference_url https://access.redhat.com/errata/RHSA-2023:3590
reference_id RHSA-2023:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3590
24
reference_url https://access.redhat.com/errata/RHSA-2023:3596
reference_id RHSA-2023:3596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3596
25
reference_url https://access.redhat.com/errata/RHSA-2023:3597
reference_id RHSA-2023:3597
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3597
26
reference_url https://usn.ubuntu.com/6143-1/
reference_id USN-6143-1
reference_type
scores
url https://usn.ubuntu.com/6143-1/
27
reference_url https://usn.ubuntu.com/6214-1/
reference_id USN-6214-1
reference_type
scores
url https://usn.ubuntu.com/6214-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-34414
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ngja-2eff-h7hk
34
url VCID-p1te-bjdc-qke9
vulnerability_id VCID-p1te-bjdc-qke9
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32210
reference_id
reference_type
scores
0
value 0.00225
scoring_system epss
scoring_elements 0.45226
published_at 2026-04-13T12:55:00Z
1
value 0.00225
scoring_system epss
scoring_elements 0.45216
published_at 2026-04-02T12:55:00Z
2
value 0.00225
scoring_system epss
scoring_elements 0.45239
published_at 2026-04-04T12:55:00Z
3
value 0.00225
scoring_system epss
scoring_elements 0.45181
published_at 2026-04-07T12:55:00Z
4
value 0.00225
scoring_system epss
scoring_elements 0.45236
published_at 2026-04-09T12:55:00Z
5
value 0.00225
scoring_system epss
scoring_elements 0.45257
published_at 2026-04-11T12:55:00Z
6
value 0.00225
scoring_system epss
scoring_elements 0.45225
published_at 2026-04-12T12:55:00Z
7
value 0.0024
scoring_system epss
scoring_elements 0.47295
published_at 2026-04-21T12:55:00Z
8
value 0.0024
scoring_system epss
scoring_elements 0.4735
published_at 2026-04-16T12:55:00Z
9
value 0.0024
scoring_system epss
scoring_elements 0.47345
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32210
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
reference_id mfsa2023-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
2
reference_url https://usn.ubuntu.com/6074-1/
reference_id USN-6074-1
reference_type
scores
url https://usn.ubuntu.com/6074-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-32210
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p1te-bjdc-qke9
35
url VCID-p3yc-cddb-hkhe
vulnerability_id VCID-p3yc-cddb-hkhe
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5722
reference_id
reference_type
scores
0
value 0.00166
scoring_system epss
scoring_elements 0.37613
published_at 2026-04-21T12:55:00Z
1
value 0.00166
scoring_system epss
scoring_elements 0.37728
published_at 2026-04-02T12:55:00Z
2
value 0.00166
scoring_system epss
scoring_elements 0.37674
published_at 2026-04-12T12:55:00Z
3
value 0.00166
scoring_system epss
scoring_elements 0.37646
published_at 2026-04-13T12:55:00Z
4
value 0.00166
scoring_system epss
scoring_elements 0.37693
published_at 2026-04-16T12:55:00Z
5
value 0.00166
scoring_system epss
scoring_elements 0.37675
published_at 2026-04-18T12:55:00Z
6
value 0.00166
scoring_system epss
scoring_elements 0.37753
published_at 2026-04-04T12:55:00Z
7
value 0.00166
scoring_system epss
scoring_elements 0.37631
published_at 2026-04-07T12:55:00Z
8
value 0.00166
scoring_system epss
scoring_elements 0.37682
published_at 2026-04-08T12:55:00Z
9
value 0.00166
scoring_system epss
scoring_elements 0.37695
published_at 2026-04-09T12:55:00Z
10
value 0.00166
scoring_system epss
scoring_elements 0.37709
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5722
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-45
reference_id mfsa2023-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-45
2
reference_url https://www.mozilla.org/security/advisories/mfsa2023-45/
reference_id mfsa2023-45
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-12T20:17:21Z/
url https://www.mozilla.org/security/advisories/mfsa2023-45/
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1738426
reference_id show_bug.cgi?id=1738426
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-12T20:17:21Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1738426
4
reference_url https://usn.ubuntu.com/6456-1/
reference_id USN-6456-1
reference_type
scores
url https://usn.ubuntu.com/6456-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-5722
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p3yc-cddb-hkhe
36
url VCID-pa3c-jpdg-ukhh
vulnerability_id VCID-pa3c-jpdg-ukhh
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6213
reference_id
reference_type
scores
0
value 0.00224
scoring_system epss
scoring_elements 0.45144
published_at 2026-04-21T12:55:00Z
1
value 0.00224
scoring_system epss
scoring_elements 0.45141
published_at 2026-04-02T12:55:00Z
2
value 0.00224
scoring_system epss
scoring_elements 0.45164
published_at 2026-04-04T12:55:00Z
3
value 0.00224
scoring_system epss
scoring_elements 0.45106
published_at 2026-04-07T12:55:00Z
4
value 0.00224
scoring_system epss
scoring_elements 0.45158
published_at 2026-04-09T12:55:00Z
5
value 0.00224
scoring_system epss
scoring_elements 0.4518
published_at 2026-04-11T12:55:00Z
6
value 0.00224
scoring_system epss
scoring_elements 0.45147
published_at 2026-04-12T12:55:00Z
7
value 0.00224
scoring_system epss
scoring_elements 0.45149
published_at 2026-04-13T12:55:00Z
8
value 0.00224
scoring_system epss
scoring_elements 0.45199
published_at 2026-04-16T12:55:00Z
9
value 0.00224
scoring_system epss
scoring_elements 0.45193
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6213
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
reference_id mfsa2023-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
2
reference_url https://usn.ubuntu.com/6509-1/
reference_id USN-6509-1
reference_type
scores
url https://usn.ubuntu.com/6509-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-6213
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pa3c-jpdg-ukhh
37
url VCID-pepm-1t68-uuf1
vulnerability_id VCID-pepm-1t68-uuf1
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6864.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6864.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6864
reference_id
reference_type
scores
0
value 0.00493
scoring_system epss
scoring_elements 0.65706
published_at 2026-04-21T12:55:00Z
1
value 0.0059
scoring_system epss
scoring_elements 0.69182
published_at 2026-04-08T12:55:00Z
2
value 0.0059
scoring_system epss
scoring_elements 0.6918
published_at 2026-04-13T12:55:00Z
3
value 0.0059
scoring_system epss
scoring_elements 0.69219
published_at 2026-04-16T12:55:00Z
4
value 0.0059
scoring_system epss
scoring_elements 0.69228
published_at 2026-04-18T12:55:00Z
5
value 0.0059
scoring_system epss
scoring_elements 0.6913
published_at 2026-04-02T12:55:00Z
6
value 0.0059
scoring_system epss
scoring_elements 0.69151
published_at 2026-04-04T12:55:00Z
7
value 0.0059
scoring_system epss
scoring_elements 0.69132
published_at 2026-04-07T12:55:00Z
8
value 0.0059
scoring_system epss
scoring_elements 0.69201
published_at 2026-04-09T12:55:00Z
9
value 0.0059
scoring_system epss
scoring_elements 0.69223
published_at 2026-04-11T12:55:00Z
10
value 0.0059
scoring_system epss
scoring_elements 0.69208
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6864
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255370
reference_id 2255370
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255370
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-6864
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pepm-1t68-uuf1
38
url VCID-pgst-zjuv-guee
vulnerability_id VCID-pgst-zjuv-guee
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4579
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.3782
published_at 2026-04-21T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37936
published_at 2026-04-02T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37917
published_at 2026-04-11T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37881
published_at 2026-04-12T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37856
published_at 2026-04-13T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37882
published_at 2026-04-18T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37962
published_at 2026-04-04T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37839
published_at 2026-04-07T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37889
published_at 2026-04-08T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37902
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4579
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
reference_id mfsa2023-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
2
reference_url https://www.mozilla.org/security/advisories/mfsa2023-34/
reference_id mfsa2023-34
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T17:51:58Z/
url https://www.mozilla.org/security/advisories/mfsa2023-34/
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1842766
reference_id show_bug.cgi?id=1842766
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T17:51:58Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1842766
4
reference_url https://usn.ubuntu.com/6320-1/
reference_id USN-6320-1
reference_type
scores
url https://usn.ubuntu.com/6320-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-4579
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pgst-zjuv-guee
39
url VCID-pn8f-h9r2-xug8
vulnerability_id VCID-pn8f-h9r2-xug8
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6211
reference_id
reference_type
scores
0
value 0.00135
scoring_system epss
scoring_elements 0.3321
published_at 2026-04-21T12:55:00Z
1
value 0.00135
scoring_system epss
scoring_elements 0.33349
published_at 2026-04-02T12:55:00Z
2
value 0.00135
scoring_system epss
scoring_elements 0.33381
published_at 2026-04-04T12:55:00Z
3
value 0.00135
scoring_system epss
scoring_elements 0.33212
published_at 2026-04-07T12:55:00Z
4
value 0.00135
scoring_system epss
scoring_elements 0.33255
published_at 2026-04-08T12:55:00Z
5
value 0.00135
scoring_system epss
scoring_elements 0.3329
published_at 2026-04-09T12:55:00Z
6
value 0.00135
scoring_system epss
scoring_elements 0.33294
published_at 2026-04-11T12:55:00Z
7
value 0.00135
scoring_system epss
scoring_elements 0.33253
published_at 2026-04-12T12:55:00Z
8
value 0.00135
scoring_system epss
scoring_elements 0.3323
published_at 2026-04-13T12:55:00Z
9
value 0.00135
scoring_system epss
scoring_elements 0.33269
published_at 2026-04-16T12:55:00Z
10
value 0.00135
scoring_system epss
scoring_elements 0.33246
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6211
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
reference_id mfsa2023-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
2
reference_url https://usn.ubuntu.com/6509-1/
reference_id USN-6509-1
reference_type
scores
url https://usn.ubuntu.com/6509-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-6211
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pn8f-h9r2-xug8
40
url VCID-qdqj-rhcr-wbca
vulnerability_id VCID-qdqj-rhcr-wbca
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6856.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6856.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6856
reference_id
reference_type
scores
0
value 0.10471
scoring_system epss
scoring_elements 0.93268
published_at 2026-04-21T12:55:00Z
1
value 0.10986
scoring_system epss
scoring_elements 0.93413
published_at 2026-04-08T12:55:00Z
2
value 0.10986
scoring_system epss
scoring_elements 0.93422
published_at 2026-04-13T12:55:00Z
3
value 0.10986
scoring_system epss
scoring_elements 0.93441
published_at 2026-04-16T12:55:00Z
4
value 0.10986
scoring_system epss
scoring_elements 0.93446
published_at 2026-04-18T12:55:00Z
5
value 0.10986
scoring_system epss
scoring_elements 0.93397
published_at 2026-04-02T12:55:00Z
6
value 0.10986
scoring_system epss
scoring_elements 0.93405
published_at 2026-04-07T12:55:00Z
7
value 0.10986
scoring_system epss
scoring_elements 0.93416
published_at 2026-04-09T12:55:00Z
8
value 0.10986
scoring_system epss
scoring_elements 0.93421
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6856
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255360
reference_id 2255360
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255360
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-6856
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qdqj-rhcr-wbca
41
url VCID-qqn4-w66p-vfhd
vulnerability_id VCID-qqn4-w66p-vfhd
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5731
reference_id
reference_type
scores
0
value 0.00398
scoring_system epss
scoring_elements 0.60619
published_at 2026-04-21T12:55:00Z
1
value 0.00398
scoring_system epss
scoring_elements 0.60537
published_at 2026-04-02T12:55:00Z
2
value 0.00398
scoring_system epss
scoring_elements 0.60563
published_at 2026-04-04T12:55:00Z
3
value 0.00398
scoring_system epss
scoring_elements 0.60532
published_at 2026-04-07T12:55:00Z
4
value 0.00398
scoring_system epss
scoring_elements 0.60581
published_at 2026-04-08T12:55:00Z
5
value 0.00398
scoring_system epss
scoring_elements 0.60597
published_at 2026-04-09T12:55:00Z
6
value 0.00398
scoring_system epss
scoring_elements 0.60621
published_at 2026-04-11T12:55:00Z
7
value 0.00398
scoring_system epss
scoring_elements 0.60606
published_at 2026-04-12T12:55:00Z
8
value 0.00398
scoring_system epss
scoring_elements 0.60585
published_at 2026-04-13T12:55:00Z
9
value 0.00398
scoring_system epss
scoring_elements 0.60626
published_at 2026-04-16T12:55:00Z
10
value 0.00398
scoring_system epss
scoring_elements 0.60631
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5731
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-45
reference_id mfsa2023-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-45
2
reference_url https://usn.ubuntu.com/6456-1/
reference_id USN-6456-1
reference_type
scores
url https://usn.ubuntu.com/6456-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-5731
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qqn4-w66p-vfhd
42
url VCID-rafq-49c4-u7g6
vulnerability_id VCID-rafq-49c4-u7g6
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32215.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32215.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32215
reference_id
reference_type
scores
0
value 0.00268
scoring_system epss
scoring_elements 0.50253
published_at 2026-04-21T12:55:00Z
1
value 0.00268
scoring_system epss
scoring_elements 0.50246
published_at 2026-04-12T12:55:00Z
2
value 0.00268
scoring_system epss
scoring_elements 0.50234
published_at 2026-04-13T12:55:00Z
3
value 0.00268
scoring_system epss
scoring_elements 0.50279
published_at 2026-04-18T12:55:00Z
4
value 0.00268
scoring_system epss
scoring_elements 0.5022
published_at 2026-04-02T12:55:00Z
5
value 0.00268
scoring_system epss
scoring_elements 0.50249
published_at 2026-04-04T12:55:00Z
6
value 0.00268
scoring_system epss
scoring_elements 0.50199
published_at 2026-04-07T12:55:00Z
7
value 0.00268
scoring_system epss
scoring_elements 0.50252
published_at 2026-04-08T12:55:00Z
8
value 0.00268
scoring_system epss
scoring_elements 0.50245
published_at 2026-04-09T12:55:00Z
9
value 0.00268
scoring_system epss
scoring_elements 0.50272
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32215
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2196753
reference_id 2196753
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2196753
10
reference_url https://security.gentoo.org/glsa/202312-03
reference_id GLSA-202312-03
reference_type
scores
url https://security.gentoo.org/glsa/202312-03
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
reference_id mfsa2023-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-17
reference_id mfsa2023-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-17
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-18
reference_id mfsa2023-18
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-18
14
reference_url https://access.redhat.com/errata/RHSA-2023:3137
reference_id RHSA-2023:3137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3137
15
reference_url https://access.redhat.com/errata/RHSA-2023:3138
reference_id RHSA-2023:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3138
16
reference_url https://access.redhat.com/errata/RHSA-2023:3139
reference_id RHSA-2023:3139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3139
17
reference_url https://access.redhat.com/errata/RHSA-2023:3140
reference_id RHSA-2023:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3140
18
reference_url https://access.redhat.com/errata/RHSA-2023:3141
reference_id RHSA-2023:3141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3141
19
reference_url https://access.redhat.com/errata/RHSA-2023:3142
reference_id RHSA-2023:3142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3142
20
reference_url https://access.redhat.com/errata/RHSA-2023:3143
reference_id RHSA-2023:3143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3143
21
reference_url https://access.redhat.com/errata/RHSA-2023:3149
reference_id RHSA-2023:3149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3149
22
reference_url https://access.redhat.com/errata/RHSA-2023:3150
reference_id RHSA-2023:3150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3150
23
reference_url https://access.redhat.com/errata/RHSA-2023:3151
reference_id RHSA-2023:3151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3151
24
reference_url https://access.redhat.com/errata/RHSA-2023:3152
reference_id RHSA-2023:3152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3152
25
reference_url https://access.redhat.com/errata/RHSA-2023:3153
reference_id RHSA-2023:3153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3153
26
reference_url https://access.redhat.com/errata/RHSA-2023:3154
reference_id RHSA-2023:3154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3154
27
reference_url https://access.redhat.com/errata/RHSA-2023:3155
reference_id RHSA-2023:3155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3155
28
reference_url https://access.redhat.com/errata/RHSA-2023:3220
reference_id RHSA-2023:3220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3220
29
reference_url https://access.redhat.com/errata/RHSA-2023:3221
reference_id RHSA-2023:3221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3221
30
reference_url https://usn.ubuntu.com/6074-1/
reference_id USN-6074-1
reference_type
scores
url https://usn.ubuntu.com/6074-1/
31
reference_url https://usn.ubuntu.com/6075-1/
reference_id USN-6075-1
reference_type
scores
url https://usn.ubuntu.com/6075-1/
32
reference_url https://usn.ubuntu.com/6120-1/
reference_id USN-6120-1
reference_type
scores
url https://usn.ubuntu.com/6120-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-32215
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rafq-49c4-u7g6
43
url VCID-rarq-q7qa-nud7
vulnerability_id VCID-rarq-q7qa-nud7
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32213.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32213.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32213
reference_id
reference_type
scores
0
value 0.00242
scoring_system epss
scoring_elements 0.4746
published_at 2026-04-21T12:55:00Z
1
value 0.00247
scoring_system epss
scoring_elements 0.47937
published_at 2026-04-08T12:55:00Z
2
value 0.00247
scoring_system epss
scoring_elements 0.47943
published_at 2026-04-13T12:55:00Z
3
value 0.00247
scoring_system epss
scoring_elements 0.47997
published_at 2026-04-16T12:55:00Z
4
value 0.00247
scoring_system epss
scoring_elements 0.47992
published_at 2026-04-18T12:55:00Z
5
value 0.00247
scoring_system epss
scoring_elements 0.47914
published_at 2026-04-02T12:55:00Z
6
value 0.00247
scoring_system epss
scoring_elements 0.47936
published_at 2026-04-04T12:55:00Z
7
value 0.00247
scoring_system epss
scoring_elements 0.47884
published_at 2026-04-07T12:55:00Z
8
value 0.00247
scoring_system epss
scoring_elements 0.47932
published_at 2026-04-09T12:55:00Z
9
value 0.00247
scoring_system epss
scoring_elements 0.47956
published_at 2026-04-11T12:55:00Z
10
value 0.00247
scoring_system epss
scoring_elements 0.47933
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32213
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2196742
reference_id 2196742
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2196742
10
reference_url https://security.gentoo.org/glsa/202312-03
reference_id GLSA-202312-03
reference_type
scores
url https://security.gentoo.org/glsa/202312-03
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
reference_id mfsa2023-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-17
reference_id mfsa2023-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-17
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-18
reference_id mfsa2023-18
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-18
14
reference_url https://access.redhat.com/errata/RHSA-2023:3137
reference_id RHSA-2023:3137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3137
15
reference_url https://access.redhat.com/errata/RHSA-2023:3138
reference_id RHSA-2023:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3138
16
reference_url https://access.redhat.com/errata/RHSA-2023:3139
reference_id RHSA-2023:3139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3139
17
reference_url https://access.redhat.com/errata/RHSA-2023:3140
reference_id RHSA-2023:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3140
18
reference_url https://access.redhat.com/errata/RHSA-2023:3141
reference_id RHSA-2023:3141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3141
19
reference_url https://access.redhat.com/errata/RHSA-2023:3142
reference_id RHSA-2023:3142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3142
20
reference_url https://access.redhat.com/errata/RHSA-2023:3143
reference_id RHSA-2023:3143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3143
21
reference_url https://access.redhat.com/errata/RHSA-2023:3149
reference_id RHSA-2023:3149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3149
22
reference_url https://access.redhat.com/errata/RHSA-2023:3150
reference_id RHSA-2023:3150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3150
23
reference_url https://access.redhat.com/errata/RHSA-2023:3151
reference_id RHSA-2023:3151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3151
24
reference_url https://access.redhat.com/errata/RHSA-2023:3152
reference_id RHSA-2023:3152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3152
25
reference_url https://access.redhat.com/errata/RHSA-2023:3153
reference_id RHSA-2023:3153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3153
26
reference_url https://access.redhat.com/errata/RHSA-2023:3154
reference_id RHSA-2023:3154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3154
27
reference_url https://access.redhat.com/errata/RHSA-2023:3155
reference_id RHSA-2023:3155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3155
28
reference_url https://access.redhat.com/errata/RHSA-2023:3220
reference_id RHSA-2023:3220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3220
29
reference_url https://access.redhat.com/errata/RHSA-2023:3221
reference_id RHSA-2023:3221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3221
30
reference_url https://usn.ubuntu.com/6074-1/
reference_id USN-6074-1
reference_type
scores
url https://usn.ubuntu.com/6074-1/
31
reference_url https://usn.ubuntu.com/6075-1/
reference_id USN-6075-1
reference_type
scores
url https://usn.ubuntu.com/6075-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-32213
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rarq-q7qa-nud7
44
url VCID-rawu-vyqx-2ker
vulnerability_id VCID-rawu-vyqx-2ker
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5172
reference_id
reference_type
scores
0
value 0.00322
scoring_system epss
scoring_elements 0.55313
published_at 2026-04-21T12:55:00Z
1
value 0.00322
scoring_system epss
scoring_elements 0.55266
published_at 2026-04-02T12:55:00Z
2
value 0.00322
scoring_system epss
scoring_elements 0.55321
published_at 2026-04-08T12:55:00Z
3
value 0.00322
scoring_system epss
scoring_elements 0.55322
published_at 2026-04-09T12:55:00Z
4
value 0.00322
scoring_system epss
scoring_elements 0.55333
published_at 2026-04-11T12:55:00Z
5
value 0.00322
scoring_system epss
scoring_elements 0.55312
published_at 2026-04-12T12:55:00Z
6
value 0.00322
scoring_system epss
scoring_elements 0.55293
published_at 2026-04-13T12:55:00Z
7
value 0.00322
scoring_system epss
scoring_elements 0.5533
published_at 2026-04-16T12:55:00Z
8
value 0.00322
scoring_system epss
scoring_elements 0.55335
published_at 2026-04-18T12:55:00Z
9
value 0.00322
scoring_system epss
scoring_elements 0.5529
published_at 2026-04-04T12:55:00Z
10
value 0.00322
scoring_system epss
scoring_elements 0.55271
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5172
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
reference_id mfsa2023-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
2
reference_url https://www.mozilla.org/security/advisories/mfsa2023-41/
reference_id mfsa2023-41
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:05Z/
url https://www.mozilla.org/security/advisories/mfsa2023-41/
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1852218
reference_id show_bug.cgi?id=1852218
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:05Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1852218
4
reference_url https://usn.ubuntu.com/6404-1/
reference_id USN-6404-1
reference_type
scores
url https://usn.ubuntu.com/6404-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-5172
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rawu-vyqx-2ker
45
url VCID-rx2r-8htx-rfbt
vulnerability_id VCID-rx2r-8htx-rfbt
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6210
reference_id
reference_type
scores
0
value 0.00183
scoring_system epss
scoring_elements 0.39963
published_at 2026-04-21T12:55:00Z
1
value 0.00183
scoring_system epss
scoring_elements 0.40051
published_at 2026-04-02T12:55:00Z
2
value 0.00183
scoring_system epss
scoring_elements 0.40078
published_at 2026-04-04T12:55:00Z
3
value 0.00183
scoring_system epss
scoring_elements 0.39999
published_at 2026-04-07T12:55:00Z
4
value 0.00183
scoring_system epss
scoring_elements 0.40052
published_at 2026-04-08T12:55:00Z
5
value 0.00183
scoring_system epss
scoring_elements 0.40066
published_at 2026-04-09T12:55:00Z
6
value 0.00183
scoring_system epss
scoring_elements 0.40077
published_at 2026-04-11T12:55:00Z
7
value 0.00183
scoring_system epss
scoring_elements 0.4004
published_at 2026-04-12T12:55:00Z
8
value 0.00183
scoring_system epss
scoring_elements 0.40021
published_at 2026-04-13T12:55:00Z
9
value 0.00183
scoring_system epss
scoring_elements 0.4007
published_at 2026-04-16T12:55:00Z
10
value 0.00183
scoring_system epss
scoring_elements 0.40041
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6210
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
reference_id mfsa2023-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
2
reference_url https://usn.ubuntu.com/6509-1/
reference_id USN-6509-1
reference_type
scores
url https://usn.ubuntu.com/6509-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-6210
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rx2r-8htx-rfbt
46
url VCID-sgt1-7dt3-yyau
vulnerability_id VCID-sgt1-7dt3-yyau
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5173
reference_id
reference_type
scores
0
value 0.00237
scoring_system epss
scoring_elements 0.46899
published_at 2026-04-18T12:55:00Z
1
value 0.00237
scoring_system epss
scoring_elements 0.46822
published_at 2026-04-02T12:55:00Z
2
value 0.00237
scoring_system epss
scoring_elements 0.46841
published_at 2026-04-04T12:55:00Z
3
value 0.00237
scoring_system epss
scoring_elements 0.4679
published_at 2026-04-07T12:55:00Z
4
value 0.00237
scoring_system epss
scoring_elements 0.46845
published_at 2026-04-08T12:55:00Z
5
value 0.00237
scoring_system epss
scoring_elements 0.46844
published_at 2026-04-09T12:55:00Z
6
value 0.00237
scoring_system epss
scoring_elements 0.46867
published_at 2026-04-11T12:55:00Z
7
value 0.00237
scoring_system epss
scoring_elements 0.46839
published_at 2026-04-12T12:55:00Z
8
value 0.00237
scoring_system epss
scoring_elements 0.46847
published_at 2026-04-21T12:55:00Z
9
value 0.00237
scoring_system epss
scoring_elements 0.46902
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5173
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
reference_id mfsa2023-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
2
reference_url https://usn.ubuntu.com/6404-1/
reference_id USN-6404-1
reference_type
scores
url https://usn.ubuntu.com/6404-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-5173
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sgt1-7dt3-yyau
47
url VCID-tps4-kxe2-5ugb
vulnerability_id VCID-tps4-kxe2-5ugb
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6858.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6858.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6858
reference_id
reference_type
scores
0
value 0.00417
scoring_system epss
scoring_elements 0.61769
published_at 2026-04-21T12:55:00Z
1
value 0.00452
scoring_system epss
scoring_elements 0.63778
published_at 2026-04-16T12:55:00Z
2
value 0.00452
scoring_system epss
scoring_elements 0.63723
published_at 2026-04-02T12:55:00Z
3
value 0.00452
scoring_system epss
scoring_elements 0.63748
published_at 2026-04-04T12:55:00Z
4
value 0.00452
scoring_system epss
scoring_elements 0.63788
published_at 2026-04-18T12:55:00Z
5
value 0.00452
scoring_system epss
scoring_elements 0.6376
published_at 2026-04-08T12:55:00Z
6
value 0.00452
scoring_system epss
scoring_elements 0.63708
published_at 2026-04-07T12:55:00Z
7
value 0.00452
scoring_system epss
scoring_elements 0.63742
published_at 2026-04-13T12:55:00Z
8
value 0.00452
scoring_system epss
scoring_elements 0.63776
published_at 2026-04-12T12:55:00Z
9
value 0.00452
scoring_system epss
scoring_elements 0.63791
published_at 2026-04-11T12:55:00Z
10
value 0.00452
scoring_system epss
scoring_elements 0.63777
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6858
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255363
reference_id 2255363
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255363
17
reference_url https://www.debian.org/security/2023/dsa-5581
reference_id dsa-5581
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://www.debian.org/security/2023/dsa-5581
18
reference_url https://www.debian.org/security/2023/dsa-5582
reference_id dsa-5582
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://www.debian.org/security/2023/dsa-5582
19
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
21
reference_url https://www.mozilla.org/security/advisories/mfsa2023-54/
reference_id mfsa2023-54
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://www.mozilla.org/security/advisories/mfsa2023-54/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
23
reference_url https://www.mozilla.org/security/advisories/mfsa2023-55/
reference_id mfsa2023-55
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://www.mozilla.org/security/advisories/mfsa2023-55/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
25
reference_url https://www.mozilla.org/security/advisories/mfsa2023-56/
reference_id mfsa2023-56
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://www.mozilla.org/security/advisories/mfsa2023-56/
26
reference_url https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html
reference_id msg00020.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html
27
reference_url https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html
28
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
29
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
30
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
31
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
32
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
33
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
34
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
35
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
36
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
37
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
38
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
39
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
40
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
41
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
42
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
43
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
44
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
45
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
46
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1826791
reference_id show_bug.cgi?id=1826791
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1826791
47
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
48
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-6858
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tps4-kxe2-5ugb
48
url VCID-up33-tw5e-bucs
vulnerability_id VCID-up33-tw5e-bucs
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-37204
reference_id
reference_type
scores
0
value 0.00209
scoring_system epss
scoring_elements 0.43332
published_at 2026-04-21T12:55:00Z
1
value 0.00209
scoring_system epss
scoring_elements 0.43342
published_at 2026-04-02T12:55:00Z
2
value 0.00209
scoring_system epss
scoring_elements 0.4337
published_at 2026-04-04T12:55:00Z
3
value 0.00209
scoring_system epss
scoring_elements 0.43308
published_at 2026-04-07T12:55:00Z
4
value 0.00209
scoring_system epss
scoring_elements 0.4336
published_at 2026-04-08T12:55:00Z
5
value 0.00209
scoring_system epss
scoring_elements 0.43375
published_at 2026-04-09T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43396
published_at 2026-04-11T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43365
published_at 2026-04-12T12:55:00Z
8
value 0.00209
scoring_system epss
scoring_elements 0.4335
published_at 2026-04-13T12:55:00Z
9
value 0.00209
scoring_system epss
scoring_elements 0.43409
published_at 2026-04-16T12:55:00Z
10
value 0.00209
scoring_system epss
scoring_elements 0.43398
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-37204
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
reference_id mfsa2023-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
2
reference_url https://usn.ubuntu.com/6201-1/
reference_id USN-6201-1
reference_type
scores
url https://usn.ubuntu.com/6201-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-37204
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-up33-tw5e-bucs
49
url VCID-v4vu-azan-jyev
vulnerability_id VCID-v4vu-azan-jyev
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5129.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5129.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2240759
reference_id 2240759
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2240759
3
reference_url https://access.redhat.com/errata/RHSA-2023:5183
reference_id RHSA-2023:5183
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5183
4
reference_url https://access.redhat.com/errata/RHSA-2023:5184
reference_id RHSA-2023:5184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5184
5
reference_url https://access.redhat.com/errata/RHSA-2023:5185
reference_id RHSA-2023:5185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5185
6
reference_url https://access.redhat.com/errata/RHSA-2023:5186
reference_id RHSA-2023:5186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5186
7
reference_url https://access.redhat.com/errata/RHSA-2023:5187
reference_id RHSA-2023:5187
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5187
8
reference_url https://access.redhat.com/errata/RHSA-2023:5188
reference_id RHSA-2023:5188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5188
9
reference_url https://access.redhat.com/errata/RHSA-2023:5189
reference_id RHSA-2023:5189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5189
10
reference_url https://access.redhat.com/errata/RHSA-2023:5190
reference_id RHSA-2023:5190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5190
11
reference_url https://access.redhat.com/errata/RHSA-2023:5191
reference_id RHSA-2023:5191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5191
12
reference_url https://access.redhat.com/errata/RHSA-2023:5192
reference_id RHSA-2023:5192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5192
13
reference_url https://access.redhat.com/errata/RHSA-2023:5197
reference_id RHSA-2023:5197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5197
14
reference_url https://access.redhat.com/errata/RHSA-2023:5198
reference_id RHSA-2023:5198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5198
15
reference_url https://access.redhat.com/errata/RHSA-2023:5200
reference_id RHSA-2023:5200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5200
16
reference_url https://access.redhat.com/errata/RHSA-2023:5201
reference_id RHSA-2023:5201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5201
17
reference_url https://access.redhat.com/errata/RHSA-2023:5202
reference_id RHSA-2023:5202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5202
18
reference_url https://access.redhat.com/errata/RHSA-2023:5204
reference_id RHSA-2023:5204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5204
19
reference_url https://access.redhat.com/errata/RHSA-2023:5205
reference_id RHSA-2023:5205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5205
20
reference_url https://access.redhat.com/errata/RHSA-2023:5214
reference_id RHSA-2023:5214
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5214
21
reference_url https://access.redhat.com/errata/RHSA-2023:5223
reference_id RHSA-2023:5223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5223
22
reference_url https://access.redhat.com/errata/RHSA-2023:5224
reference_id RHSA-2023:5224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5224
23
reference_url https://access.redhat.com/errata/RHSA-2023:5236
reference_id RHSA-2023:5236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5236
24
reference_url https://access.redhat.com/errata/RHSA-2023:5309
reference_id RHSA-2023:5309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5309
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-5129
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v4vu-azan-jyev
50
url VCID-vdzj-kqfy-d3b7
vulnerability_id VCID-vdzj-kqfy-d3b7
summary
libwebp: OOB write in BuildHuffmanTable
Heap buffer overflow in libwebp allow a remote attacker to perform an out of bounds memory write via a crafted HTML page.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4863.json
reference_id
reference_type
scores
0
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4863.json
1
reference_url https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway
2
reference_url https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4863
reference_id
reference_type
scores
0
value 0.93606
scoring_system epss
scoring_elements 0.99837
published_at 2026-04-18T12:55:00Z
1
value 0.93606
scoring_system epss
scoring_elements 0.99835
published_at 2026-04-07T12:55:00Z
2
value 0.93606
scoring_system epss
scoring_elements 0.99836
published_at 2026-04-13T12:55:00Z
3
value 0.94083
scoring_system epss
scoring_elements 0.99905
published_at 2026-04-12T12:55:00Z
4
value 0.94117
scoring_system epss
scoring_elements 0.99911
published_at 2026-04-21T12:55:00Z
5
value 0.94117
scoring_system epss
scoring_elements 0.99909
published_at 2026-04-04T12:55:00Z
6
value 0.94117
scoring_system epss
scoring_elements 0.9991
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4863
4
reference_url https://blog.isosceles.com/the-webp-0day
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://blog.isosceles.com/the-webp-0day
5
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1215231
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://bugzilla.suse.com/show_bug.cgi?id=1215231
6
reference_url https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html
7
reference_url https://crbug.com/1479274
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://crbug.com/1479274
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4863
9
reference_url https://en.bandisoft.com/honeyview/history
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://en.bandisoft.com/honeyview/history
10
reference_url https://en.bandisoft.com/honeyview/history/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://en.bandisoft.com/honeyview/history/
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://github.com/dlemstra/Magick.NET/releases/tag/13.3.0
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/dlemstra/Magick.NET/releases/tag/13.3.0
13
reference_url https://github.com/electron/electron/pull/39823
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/pull/39823
14
reference_url https://github.com/electron/electron/pull/39825
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/pull/39825
15
reference_url https://github.com/electron/electron/pull/39826
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/pull/39826
16
reference_url https://github.com/electron/electron/pull/39827
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/pull/39827
17
reference_url https://github.com/electron/electron/pull/39828
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/pull/39828
18
reference_url https://github.com/ImageMagick/ImageMagick/discussions/6664
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/ImageMagick/ImageMagick/discussions/6664
19
reference_url https://github.com/jaredforth/webp/commit/9d4c56e63abecc777df71c702503c3eaabd7dcbc
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jaredforth/webp/commit/9d4c56e63abecc777df71c702503c3eaabd7dcbc
20
reference_url https://github.com/jaredforth/webp/pull/30
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jaredforth/webp/pull/30
21
reference_url https://github.com/python-pillow/Pillow/pull/7395
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/pull/7395
22
reference_url https://github.com/qnighy/libwebp-sys2-rs/commit/4560c473a76ec8bd8c650f19ddf9d7a44f719f8b
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/qnighy/libwebp-sys2-rs/commit/4560c473a76ec8bd8c650f19ddf9d7a44f719f8b
23
reference_url https://github.com/qnighy/libwebp-sys2-rs/pull/21
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/qnighy/libwebp-sys2-rs/pull/21
24
reference_url https://github.com/webmproject/libwebp
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/webmproject/libwebp
25
reference_url https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a
26
reference_url https://github.com/webmproject/libwebp/releases/tag/v1.3.2
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://github.com/webmproject/libwebp/releases/tag/v1.3.2
27
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html
28
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html
29
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html
30
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/
32
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645
33
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/
34
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3
35
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/
37
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX
38
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/
39
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB
40
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/
41
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I
42
reference_url https://news.ycombinator.com/item?id=37478403
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://news.ycombinator.com/item?id=37478403
43
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-4863
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-4863
44
reference_url https://pillow.readthedocs.io/en/stable/releasenotes/10.0.1.html#security
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pillow.readthedocs.io/en/stable/releasenotes/10.0.1.html#security
45
reference_url https://rustsec.org/advisories/RUSTSEC-2023-0060.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://rustsec.org/advisories/RUSTSEC-2023-0060.html
46
reference_url https://rustsec.org/advisories/RUSTSEC-2023-0061.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://rustsec.org/advisories/RUSTSEC-2023-0061.html
47
reference_url https://security.gentoo.org/glsa/202309-05
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://security.gentoo.org/glsa/202309-05
48
reference_url https://security.gentoo.org/glsa/202401-10
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://security.gentoo.org/glsa/202401-10
49
reference_url https://security.netapp.com/advisory/ntap-20230929-0011
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20230929-0011
50
reference_url https://sethmlarson.dev/security-developer-in-residence-weekly-report-16
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://sethmlarson.dev/security-developer-in-residence-weekly-report-16
51
reference_url https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863
52
reference_url https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/
53
reference_url https://www.bentley.com/advisories/be-2023-0001
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.bentley.com/advisories/be-2023-0001
54
reference_url https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks
55
reference_url https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks/
56
reference_url https://www.debian.org/security/2023/dsa-5496
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://www.debian.org/security/2023/dsa-5496
57
reference_url https://www.debian.org/security/2023/dsa-5497
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://www.debian.org/security/2023/dsa-5497
58
reference_url https://www.debian.org/security/2023/dsa-5498
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://www.debian.org/security/2023/dsa-5498
59
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-40
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value critical
scoring_system generic_textual
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-40
60
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/
61
reference_url https://www.vicarius.io/vsociety/posts/zero-day-webp-vulnerability-cve-2023-4863
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.vicarius.io/vsociety/posts/zero-day-webp-vulnerability-cve-2023-4863
62
reference_url http://www.openwall.com/lists/oss-security/2023/09/21/4
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url http://www.openwall.com/lists/oss-security/2023/09/21/4
63
reference_url http://www.openwall.com/lists/oss-security/2023/09/22/1
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url http://www.openwall.com/lists/oss-security/2023/09/22/1
64
reference_url http://www.openwall.com/lists/oss-security/2023/09/22/3
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url http://www.openwall.com/lists/oss-security/2023/09/22/3
65
reference_url http://www.openwall.com/lists/oss-security/2023/09/22/4
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url http://www.openwall.com/lists/oss-security/2023/09/22/4
66
reference_url http://www.openwall.com/lists/oss-security/2023/09/22/5
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url http://www.openwall.com/lists/oss-security/2023/09/22/5
67
reference_url http://www.openwall.com/lists/oss-security/2023/09/22/6
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url http://www.openwall.com/lists/oss-security/2023/09/22/6
68
reference_url http://www.openwall.com/lists/oss-security/2023/09/22/7
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url http://www.openwall.com/lists/oss-security/2023/09/22/7
69
reference_url http://www.openwall.com/lists/oss-security/2023/09/22/8
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url http://www.openwall.com/lists/oss-security/2023/09/22/8
70
reference_url http://www.openwall.com/lists/oss-security/2023/09/26/1
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url http://www.openwall.com/lists/oss-security/2023/09/26/1
71
reference_url http://www.openwall.com/lists/oss-security/2023/09/26/7
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url http://www.openwall.com/lists/oss-security/2023/09/26/7
72
reference_url http://www.openwall.com/lists/oss-security/2023/09/28/1
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url http://www.openwall.com/lists/oss-security/2023/09/28/1
73
reference_url http://www.openwall.com/lists/oss-security/2023/09/28/2
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url http://www.openwall.com/lists/oss-security/2023/09/28/2
74
reference_url http://www.openwall.com/lists/oss-security/2023/09/28/4
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url http://www.openwall.com/lists/oss-security/2023/09/28/4
75
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051787
reference_id 1051787
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051787
76
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238431
reference_id 2238431
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2238431
77
reference_url https://www.bentley.com/advisories/be-2023-0001/
reference_id be-2023-0001
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://www.bentley.com/advisories/be-2023-0001/
78
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863
reference_id CVE-2023-4863
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863
79
reference_url https://security-tracker.debian.org/tracker/CVE-2023-4863
reference_id CVE-2023-4863
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://security-tracker.debian.org/tracker/CVE-2023-4863
80
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
reference_id KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
81
reference_url https://security.netapp.com/advisory/ntap-20230929-0011/
reference_id ntap-20230929-0011
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/
url https://security.netapp.com/advisory/ntap-20230929-0011/
82
reference_url https://access.redhat.com/errata/RHSA-2023:5183
reference_id RHSA-2023:5183
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5183
83
reference_url https://access.redhat.com/errata/RHSA-2023:5184
reference_id RHSA-2023:5184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5184
84
reference_url https://access.redhat.com/errata/RHSA-2023:5185
reference_id RHSA-2023:5185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5185
85
reference_url https://access.redhat.com/errata/RHSA-2023:5186
reference_id RHSA-2023:5186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5186
86
reference_url https://access.redhat.com/errata/RHSA-2023:5187
reference_id RHSA-2023:5187
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5187
87
reference_url https://access.redhat.com/errata/RHSA-2023:5188
reference_id RHSA-2023:5188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5188
88
reference_url https://access.redhat.com/errata/RHSA-2023:5189
reference_id RHSA-2023:5189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5189
89
reference_url https://access.redhat.com/errata/RHSA-2023:5190
reference_id RHSA-2023:5190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5190
90
reference_url https://access.redhat.com/errata/RHSA-2023:5191
reference_id RHSA-2023:5191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5191
91
reference_url https://access.redhat.com/errata/RHSA-2023:5192
reference_id RHSA-2023:5192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5192
92
reference_url https://access.redhat.com/errata/RHSA-2023:5197
reference_id RHSA-2023:5197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5197
93
reference_url https://access.redhat.com/errata/RHSA-2023:5198
reference_id RHSA-2023:5198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5198
94
reference_url https://access.redhat.com/errata/RHSA-2023:5200
reference_id RHSA-2023:5200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5200
95
reference_url https://access.redhat.com/errata/RHSA-2023:5201
reference_id RHSA-2023:5201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5201
96
reference_url https://access.redhat.com/errata/RHSA-2023:5202
reference_id RHSA-2023:5202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5202
97
reference_url https://access.redhat.com/errata/RHSA-2023:5204
reference_id RHSA-2023:5204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5204
98
reference_url https://access.redhat.com/errata/RHSA-2023:5205
reference_id RHSA-2023:5205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5205
99
reference_url https://access.redhat.com/errata/RHSA-2023:5214
reference_id RHSA-2023:5214
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5214
100
reference_url https://access.redhat.com/errata/RHSA-2023:5222
reference_id RHSA-2023:5222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5222
101
reference_url https://access.redhat.com/errata/RHSA-2023:5223
reference_id RHSA-2023:5223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5223
102
reference_url https://access.redhat.com/errata/RHSA-2023:5224
reference_id RHSA-2023:5224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5224
103
reference_url https://access.redhat.com/errata/RHSA-2023:5236
reference_id RHSA-2023:5236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5236
104
reference_url https://access.redhat.com/errata/RHSA-2023:5309
reference_id RHSA-2023:5309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5309
105
reference_url https://usn.ubuntu.com/6367-1/
reference_id USN-6367-1
reference_type
scores
url https://usn.ubuntu.com/6367-1/
106
reference_url https://usn.ubuntu.com/6368-1/
reference_id USN-6368-1
reference_type
scores
url https://usn.ubuntu.com/6368-1/
107
reference_url https://usn.ubuntu.com/6369-1/
reference_id USN-6369-1
reference_type
scores
url https://usn.ubuntu.com/6369-1/
108
reference_url https://usn.ubuntu.com/6369-2/
reference_id USN-6369-2
reference_type
scores
url https://usn.ubuntu.com/6369-2/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-4863, GHSA-j7hp-h8jx-5ppr
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vdzj-kqfy-d3b7
51
url VCID-wjru-492x-fqge
vulnerability_id VCID-wjru-492x-fqge
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32208
reference_id
reference_type
scores
0
value 0.00264
scoring_system epss
scoring_elements 0.49891
published_at 2026-04-09T12:55:00Z
1
value 0.00264
scoring_system epss
scoring_elements 0.49865
published_at 2026-04-02T12:55:00Z
2
value 0.00264
scoring_system epss
scoring_elements 0.49882
published_at 2026-04-13T12:55:00Z
3
value 0.00264
scoring_system epss
scoring_elements 0.49881
published_at 2026-04-12T12:55:00Z
4
value 0.00264
scoring_system epss
scoring_elements 0.49909
published_at 2026-04-11T12:55:00Z
5
value 0.00264
scoring_system epss
scoring_elements 0.49893
published_at 2026-04-04T12:55:00Z
6
value 0.00264
scoring_system epss
scoring_elements 0.49843
published_at 2026-04-07T12:55:00Z
7
value 0.00264
scoring_system epss
scoring_elements 0.49898
published_at 2026-04-08T12:55:00Z
8
value 0.00282
scoring_system epss
scoring_elements 0.51595
published_at 2026-04-21T12:55:00Z
9
value 0.00282
scoring_system epss
scoring_elements 0.51609
published_at 2026-04-16T12:55:00Z
10
value 0.00282
scoring_system epss
scoring_elements 0.51617
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32208
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
reference_id mfsa2023-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
2
reference_url https://www.mozilla.org/security/advisories/mfsa2023-16/
reference_id mfsa2023-16
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-12T20:03:38Z/
url https://www.mozilla.org/security/advisories/mfsa2023-16/
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1646034
reference_id show_bug.cgi?id=1646034
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-12T20:03:38Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1646034
4
reference_url https://usn.ubuntu.com/6074-1/
reference_id USN-6074-1
reference_type
scores
url https://usn.ubuntu.com/6074-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-32208
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wjru-492x-fqge
52
url VCID-wk3d-jxen-bbe5
vulnerability_id VCID-wk3d-jxen-bbe5
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32216
reference_id
reference_type
scores
0
value 0.0035
scoring_system epss
scoring_elements 0.575
published_at 2026-04-13T12:55:00Z
1
value 0.0035
scoring_system epss
scoring_elements 0.57471
published_at 2026-04-02T12:55:00Z
2
value 0.0035
scoring_system epss
scoring_elements 0.57493
published_at 2026-04-04T12:55:00Z
3
value 0.0035
scoring_system epss
scoring_elements 0.5747
published_at 2026-04-07T12:55:00Z
4
value 0.0035
scoring_system epss
scoring_elements 0.57523
published_at 2026-04-08T12:55:00Z
5
value 0.0035
scoring_system epss
scoring_elements 0.57526
published_at 2026-04-09T12:55:00Z
6
value 0.0035
scoring_system epss
scoring_elements 0.57542
published_at 2026-04-11T12:55:00Z
7
value 0.0035
scoring_system epss
scoring_elements 0.57519
published_at 2026-04-12T12:55:00Z
8
value 0.00373
scoring_system epss
scoring_elements 0.59068
published_at 2026-04-21T12:55:00Z
9
value 0.00373
scoring_system epss
scoring_elements 0.59085
published_at 2026-04-16T12:55:00Z
10
value 0.00373
scoring_system epss
scoring_elements 0.59089
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32216
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
reference_id mfsa2023-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
2
reference_url https://usn.ubuntu.com/6074-1/
reference_id USN-6074-1
reference_type
scores
url https://usn.ubuntu.com/6074-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-32216
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wk3d-jxen-bbe5
53
url VCID-x21e-e2q4-a3au
vulnerability_id VCID-x21e-e2q4-a3au
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-37206
reference_id
reference_type
scores
0
value 0.0023
scoring_system epss
scoring_elements 0.4578
published_at 2026-04-21T12:55:00Z
1
value 0.0023
scoring_system epss
scoring_elements 0.45768
published_at 2026-04-02T12:55:00Z
2
value 0.0023
scoring_system epss
scoring_elements 0.45789
published_at 2026-04-13T12:55:00Z
3
value 0.0023
scoring_system epss
scoring_elements 0.45739
published_at 2026-04-07T12:55:00Z
4
value 0.0023
scoring_system epss
scoring_elements 0.45796
published_at 2026-04-08T12:55:00Z
5
value 0.0023
scoring_system epss
scoring_elements 0.45793
published_at 2026-04-09T12:55:00Z
6
value 0.0023
scoring_system epss
scoring_elements 0.45815
published_at 2026-04-11T12:55:00Z
7
value 0.0023
scoring_system epss
scoring_elements 0.45784
published_at 2026-04-12T12:55:00Z
8
value 0.0023
scoring_system epss
scoring_elements 0.4584
published_at 2026-04-16T12:55:00Z
9
value 0.0023
scoring_system epss
scoring_elements 0.45833
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-37206
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
reference_id mfsa2023-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
2
reference_url https://usn.ubuntu.com/6201-1/
reference_id USN-6201-1
reference_type
scores
url https://usn.ubuntu.com/6201-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-37206
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x21e-e2q4-a3au
54
url VCID-x4v4-7y4q-mfbs
vulnerability_id VCID-x4v4-7y4q-mfbs
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6868
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.32131
published_at 2026-04-21T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.32275
published_at 2026-04-02T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32312
published_at 2026-04-04T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32136
published_at 2026-04-07T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32186
published_at 2026-04-08T12:55:00Z
5
value 0.00128
scoring_system epss
scoring_elements 0.32213
published_at 2026-04-09T12:55:00Z
6
value 0.00128
scoring_system epss
scoring_elements 0.32215
published_at 2026-04-11T12:55:00Z
7
value 0.00128
scoring_system epss
scoring_elements 0.32177
published_at 2026-04-12T12:55:00Z
8
value 0.00128
scoring_system epss
scoring_elements 0.32144
published_at 2026-04-13T12:55:00Z
9
value 0.00128
scoring_system epss
scoring_elements 0.32178
published_at 2026-04-16T12:55:00Z
10
value 0.00128
scoring_system epss
scoring_elements 0.32157
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6868
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-6868
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x4v4-7y4q-mfbs
55
url VCID-xq67-wxrq-m7hf
vulnerability_id VCID-xq67-wxrq-m7hf
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5170
reference_id
reference_type
scores
0
value 0.00233
scoring_system epss
scoring_elements 0.46111
published_at 2026-04-21T12:55:00Z
1
value 0.00233
scoring_system epss
scoring_elements 0.46085
published_at 2026-04-02T12:55:00Z
2
value 0.00233
scoring_system epss
scoring_elements 0.46104
published_at 2026-04-12T12:55:00Z
3
value 0.00233
scoring_system epss
scoring_elements 0.46113
published_at 2026-04-13T12:55:00Z
4
value 0.00233
scoring_system epss
scoring_elements 0.4617
published_at 2026-04-16T12:55:00Z
5
value 0.00233
scoring_system epss
scoring_elements 0.46166
published_at 2026-04-18T12:55:00Z
6
value 0.00233
scoring_system epss
scoring_elements 0.46107
published_at 2026-04-04T12:55:00Z
7
value 0.00233
scoring_system epss
scoring_elements 0.46054
published_at 2026-04-07T12:55:00Z
8
value 0.00233
scoring_system epss
scoring_elements 0.4611
published_at 2026-04-08T12:55:00Z
9
value 0.00233
scoring_system epss
scoring_elements 0.46108
published_at 2026-04-09T12:55:00Z
10
value 0.00233
scoring_system epss
scoring_elements 0.46132
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5170
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
reference_id mfsa2023-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
2
reference_url https://www.mozilla.org/security/advisories/mfsa2023-41/
reference_id mfsa2023-41
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:17Z/
url https://www.mozilla.org/security/advisories/mfsa2023-41/
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1846686
reference_id show_bug.cgi?id=1846686
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:17Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1846686
4
reference_url https://usn.ubuntu.com/6404-1/
reference_id USN-6404-1
reference_type
scores
url https://usn.ubuntu.com/6404-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-5170
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xq67-wxrq-m7hf
56
url VCID-yx45-47gm-jkde
vulnerability_id VCID-yx45-47gm-jkde
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32209
reference_id
reference_type
scores
0
value 0.00185
scoring_system epss
scoring_elements 0.40203
published_at 2026-04-13T12:55:00Z
1
value 0.00185
scoring_system epss
scoring_elements 0.40239
published_at 2026-04-02T12:55:00Z
2
value 0.00185
scoring_system epss
scoring_elements 0.40263
published_at 2026-04-04T12:55:00Z
3
value 0.00185
scoring_system epss
scoring_elements 0.40186
published_at 2026-04-07T12:55:00Z
4
value 0.00185
scoring_system epss
scoring_elements 0.40238
published_at 2026-04-08T12:55:00Z
5
value 0.00185
scoring_system epss
scoring_elements 0.40249
published_at 2026-04-09T12:55:00Z
6
value 0.00185
scoring_system epss
scoring_elements 0.40261
published_at 2026-04-11T12:55:00Z
7
value 0.00185
scoring_system epss
scoring_elements 0.40223
published_at 2026-04-12T12:55:00Z
8
value 0.00197
scoring_system epss
scoring_elements 0.41665
published_at 2026-04-21T12:55:00Z
9
value 0.00197
scoring_system epss
scoring_elements 0.41764
published_at 2026-04-16T12:55:00Z
10
value 0.00197
scoring_system epss
scoring_elements 0.41738
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32209
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
reference_id mfsa2023-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-16
2
reference_url https://usn.ubuntu.com/6074-1/
reference_id USN-6074-1
reference_type
scores
url https://usn.ubuntu.com/6074-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-32209
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yx45-47gm-jkde
57
url VCID-yxag-tqku-w7fz
vulnerability_id VCID-yxag-tqku-w7fz
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3482
reference_id
reference_type
scores
0
value 0.00249
scoring_system epss
scoring_elements 0.48183
published_at 2026-04-21T12:55:00Z
1
value 0.00249
scoring_system epss
scoring_elements 0.48153
published_at 2026-04-02T12:55:00Z
2
value 0.00249
scoring_system epss
scoring_elements 0.48168
published_at 2026-04-12T12:55:00Z
3
value 0.00249
scoring_system epss
scoring_elements 0.48179
published_at 2026-04-13T12:55:00Z
4
value 0.00249
scoring_system epss
scoring_elements 0.48232
published_at 2026-04-16T12:55:00Z
5
value 0.00249
scoring_system epss
scoring_elements 0.48227
published_at 2026-04-18T12:55:00Z
6
value 0.00249
scoring_system epss
scoring_elements 0.48174
published_at 2026-04-04T12:55:00Z
7
value 0.00249
scoring_system epss
scoring_elements 0.48124
published_at 2026-04-07T12:55:00Z
8
value 0.00249
scoring_system epss
scoring_elements 0.48177
published_at 2026-04-08T12:55:00Z
9
value 0.00249
scoring_system epss
scoring_elements 0.48172
published_at 2026-04-09T12:55:00Z
10
value 0.00249
scoring_system epss
scoring_elements 0.48195
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3482
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
reference_id mfsa2023-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
2
reference_url https://www.mozilla.org/security/advisories/mfsa2023-22/
reference_id mfsa2023-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-12T20:14:31Z/
url https://www.mozilla.org/security/advisories/mfsa2023-22/
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1839464
reference_id show_bug.cgi?id=1839464
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-12T20:14:31Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1839464
4
reference_url https://usn.ubuntu.com/6201-1/
reference_id USN-6201-1
reference_type
scores
url https://usn.ubuntu.com/6201-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-3482
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yxag-tqku-w7fz
58
url VCID-zhu4-sy56-1yea
vulnerability_id VCID-zhu4-sy56-1yea
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6861.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6861.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6861
reference_id
reference_type
scores
0
value 0.00415
scoring_system epss
scoring_elements 0.6171
published_at 2026-04-18T12:55:00Z
1
value 0.00415
scoring_system epss
scoring_elements 0.61704
published_at 2026-04-16T12:55:00Z
2
value 0.00415
scoring_system epss
scoring_elements 0.61609
published_at 2026-04-07T12:55:00Z
3
value 0.00415
scoring_system epss
scoring_elements 0.61639
published_at 2026-04-04T12:55:00Z
4
value 0.00415
scoring_system epss
scoring_elements 0.61658
published_at 2026-04-08T12:55:00Z
5
value 0.00415
scoring_system epss
scoring_elements 0.61672
published_at 2026-04-09T12:55:00Z
6
value 0.00415
scoring_system epss
scoring_elements 0.61694
published_at 2026-04-11T12:55:00Z
7
value 0.00415
scoring_system epss
scoring_elements 0.61663
published_at 2026-04-13T12:55:00Z
8
value 0.00415
scoring_system epss
scoring_elements 0.61682
published_at 2026-04-12T12:55:00Z
9
value 0.00499
scoring_system epss
scoring_elements 0.65975
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6861
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255367
reference_id 2255367
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255367
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox@115.6.0
purl pkg:ebuild/www-client/firefox@115.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0
1
url pkg:ebuild/www-client/firefox@121.0
purl pkg:ebuild/www-client/firefox@121.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0
aliases CVE-2023-6861
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zhu4-sy56-1yea
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0