Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/85631?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "type": "ebuild", "namespace": "www-client", "name": "firefox", "version": "121.0", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "122.0", "latest_non_vulnerable_version": "137.0.1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61498?format=api", "vulnerability_id": "VCID-2j1e-fjx6-tucr", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6872", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00251", "scoring_system": "epss", "scoring_elements": "0.48476", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00251", "scoring_system": "epss", "scoring_elements": "0.48442", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00251", "scoring_system": "epss", "scoring_elements": "0.48475", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00251", "scoring_system": "epss", "scoring_elements": "0.48525", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00251", "scoring_system": "epss", "scoring_elements": "0.4852", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00251", "scoring_system": "epss", "scoring_elements": "0.48478", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00251", "scoring_system": "epss", "scoring_elements": "0.48464", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00251", "scoring_system": "epss", "scoring_elements": "0.48416", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00251", "scoring_system": "epss", "scoring_elements": "0.48471", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00251", "scoring_system": "epss", "scoring_elements": "0.48465", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00251", "scoring_system": "epss", "scoring_elements": "0.48488", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00251", "scoring_system": "epss", "scoring_elements": "0.48462", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6872" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-56/", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-21T20:34:05Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-56/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1849186", "reference_id": "show_bug.cgi?id=1849186", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-21T20:34:05Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1849186" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-6872" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2j1e-fjx6-tucr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61511?format=api", "vulnerability_id": "VCID-3d1e-hqg2-zbbm", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37210", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32692", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38958", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38976", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.3897", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38951", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38868", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38705", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38978", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38909", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38962", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38987", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.3895", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38923", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37210" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22", "reference_id": "mfsa2023-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-22/", "reference_id": "mfsa2023-22", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:25:23Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-22/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1821886", "reference_id": "show_bug.cgi?id=1821886", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:25:23Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1821886" }, { "reference_url": "https://usn.ubuntu.com/6201-1/", "reference_id": "USN-6201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6201-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-37210" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3d1e-hqg2-zbbm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61487?format=api", "vulnerability_id": "VCID-3nrj-5r53-37ab", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6135.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6135.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6135", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.36019", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35616", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35938", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35925", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35875", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35647", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.3605", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35881", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35932", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35955", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35961", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35922", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35898", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6135" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059054", "reference_id": "1059054", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059054" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2249906", "reference_id": "2249906", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2249906" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-56/", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:59:00Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-56/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0785", "reference_id": "RHSA-2024:0785", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0785" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0786", "reference_id": "RHSA-2024:0786", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0786" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0790", "reference_id": "RHSA-2024:0790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0791", "reference_id": "RHSA-2024:0791", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0791" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1686", "reference_id": "RHSA-2024:1686", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1686" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6782", "reference_id": "RHSA-2024:6782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6786", "reference_id": "RHSA-2024:6786", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6786" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6839", "reference_id": "RHSA-2024:6839", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6839" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6850", "reference_id": "RHSA-2024:6850", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6850" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1853908", "reference_id": "show_bug.cgi?id=1853908", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:59:00Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1853908" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" }, { "reference_url": "https://usn.ubuntu.com/6727-1/", "reference_id": "USN-6727-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6727-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-6135" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3nrj-5r53-37ab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46028?format=api", "vulnerability_id": "VCID-43dj-vtap-2qd2", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32206.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32206.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32206", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34741", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34991", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3476", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.4233", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42361", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42324", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42296", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42346", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42322", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42338", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42308", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42337", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42279", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196737", "reference_id": "2196737", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196737" }, { "reference_url": "https://security.gentoo.org/glsa/202312-03", "reference_id": "GLSA-202312-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202312-03" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16", "reference_id": "mfsa2023-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-17", "reference_id": "mfsa2023-17", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-17" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-18", "reference_id": "mfsa2023-18", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3137", "reference_id": "RHSA-2023:3137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3138", "reference_id": "RHSA-2023:3138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3139", "reference_id": "RHSA-2023:3139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3140", "reference_id": "RHSA-2023:3140", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3140" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3141", "reference_id": "RHSA-2023:3141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3142", "reference_id": "RHSA-2023:3142", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3142" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3143", "reference_id": "RHSA-2023:3143", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3143" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3149", "reference_id": "RHSA-2023:3149", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3149" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3150", "reference_id": "RHSA-2023:3150", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3150" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3151", "reference_id": "RHSA-2023:3151", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3151" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3152", "reference_id": "RHSA-2023:3152", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3152" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3153", "reference_id": "RHSA-2023:3153", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3153" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3154", "reference_id": "RHSA-2023:3154", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3154" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3155", "reference_id": "RHSA-2023:3155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3220", "reference_id": "RHSA-2023:3220", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3221", "reference_id": "RHSA-2023:3221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3221" }, { "reference_url": "https://usn.ubuntu.com/6074-1/", "reference_id": "USN-6074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6074-1/" }, { "reference_url": "https://usn.ubuntu.com/6075-1/", "reference_id": "USN-6075-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6075-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-32206" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-43dj-vtap-2qd2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61493?format=api", "vulnerability_id": "VCID-4g3s-bh4t-qqhc", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6867.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6867.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6867", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.75059", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.75021", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.75064", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00931", "scoring_system": "epss", "scoring_elements": "0.7606", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00931", "scoring_system": "epss", "scoring_elements": "0.76048", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00931", "scoring_system": "epss", "scoring_elements": "0.7608", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00931", "scoring_system": "epss", "scoring_elements": "0.76093", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00931", "scoring_system": "epss", "scoring_elements": "0.76107", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00931", "scoring_system": "epss", "scoring_elements": "0.76132", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00931", "scoring_system": "epss", "scoring_elements": "0.76108", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00931", "scoring_system": "epss", "scoring_elements": "0.76106", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00931", "scoring_system": "epss", "scoring_elements": "0.76147", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00931", "scoring_system": "epss", "scoring_elements": "0.7615", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6867" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255366", "reference_id": "2255366", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255366" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5581", "reference_id": "dsa-5581", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5581" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-54/", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-54/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-56/", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-56/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html", "reference_id": "msg00020.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0011", "reference_id": "RHSA-2024:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0012", "reference_id": "RHSA-2024:0012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0012" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0019", "reference_id": "RHSA-2024:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0021", "reference_id": "RHSA-2024:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0022", "reference_id": "RHSA-2024:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0023", "reference_id": "RHSA-2024:0023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0024", "reference_id": "RHSA-2024:0024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0025", "reference_id": "RHSA-2024:0025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0026", "reference_id": "RHSA-2024:0026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0026" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1863863", "reference_id": "show_bug.cgi?id=1863863", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1863863" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-6867" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4g3s-bh4t-qqhc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61496?format=api", "vulnerability_id": "VCID-4urd-zjpu-47ed", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6870", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69644", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69584", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69637", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71421", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71461", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71473", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.7148", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71507", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71512", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71496", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71428", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71446", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6870" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-6870" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4urd-zjpu-47ed" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61499?format=api", "vulnerability_id": "VCID-4xqc-2rzu-y3aj", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6873", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.5971", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59651", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59676", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59646", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59697", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59711", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.5973", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59714", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59695", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59729", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59736", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59721", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59691", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6873" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-6873" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4xqc-2rzu-y3aj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46034?format=api", "vulnerability_id": "VCID-4z8m-8jr8-pqh6", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32212.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32212.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32212", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41292", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41406", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41298", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42025", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.41997", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.41951", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42001", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42012", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42034", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.41983", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42031", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42005", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196741", "reference_id": "2196741", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196741" }, { "reference_url": "https://security.gentoo.org/glsa/202312-03", "reference_id": "GLSA-202312-03", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:21:37Z/" } ], "url": "https://security.gentoo.org/glsa/202312-03" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16", "reference_id": "mfsa2023-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-16/", "reference_id": "mfsa2023-16", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:21:37Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-16/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-17", "reference_id": "mfsa2023-17", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-17" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-17/", "reference_id": "mfsa2023-17", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:21:37Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-17/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-18", "reference_id": "mfsa2023-18", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-18" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-18/", "reference_id": "mfsa2023-18", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:21:37Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-18/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3137", "reference_id": "RHSA-2023:3137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3138", "reference_id": "RHSA-2023:3138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3139", "reference_id": "RHSA-2023:3139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3140", "reference_id": "RHSA-2023:3140", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3140" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3141", "reference_id": "RHSA-2023:3141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3142", "reference_id": "RHSA-2023:3142", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3142" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3143", "reference_id": "RHSA-2023:3143", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3143" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3149", "reference_id": "RHSA-2023:3149", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3149" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3150", "reference_id": "RHSA-2023:3150", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3150" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3151", "reference_id": "RHSA-2023:3151", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3151" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3152", "reference_id": "RHSA-2023:3152", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3152" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3153", "reference_id": "RHSA-2023:3153", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3153" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3154", "reference_id": "RHSA-2023:3154", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3154" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3155", "reference_id": "RHSA-2023:3155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3220", "reference_id": "RHSA-2023:3220", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3221", "reference_id": "RHSA-2023:3221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3221" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1826622", "reference_id": "show_bug.cgi?id=1826622", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:21:37Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1826622" }, { "reference_url": "https://usn.ubuntu.com/6074-1/", "reference_id": "USN-6074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6074-1/" }, { "reference_url": "https://usn.ubuntu.com/6075-1/", "reference_id": "USN-6075-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6075-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-32212" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4z8m-8jr8-pqh6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51437?format=api", "vulnerability_id": "VCID-5qf5-d44c-t7gu", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6862.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6862.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.5868", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58615", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58675", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58643", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58663", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58682", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58664", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58658", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58636", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58606", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63297", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63264", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63283", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255368", "reference_id": "2255368", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255368" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5581", "reference_id": "dsa-5581", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5581" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5582", "reference_id": "dsa-5582", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5582" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-54/", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-54/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-55/", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-55/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html", "reference_id": "msg00020.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html", "reference_id": "msg00021.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0001", "reference_id": "RHSA-2024:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0002", "reference_id": "RHSA-2024:0002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0003", "reference_id": "RHSA-2024:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0004", "reference_id": "RHSA-2024:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0005", "reference_id": "RHSA-2024:0005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0011", "reference_id": "RHSA-2024:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0012", "reference_id": "RHSA-2024:0012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0012" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0019", "reference_id": "RHSA-2024:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0021", "reference_id": "RHSA-2024:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0022", "reference_id": "RHSA-2024:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0023", "reference_id": "RHSA-2024:0023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0024", "reference_id": "RHSA-2024:0024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0025", "reference_id": "RHSA-2024:0025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0026", "reference_id": "RHSA-2024:0026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0027", "reference_id": "RHSA-2024:0027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0028", "reference_id": "RHSA-2024:0028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0029", "reference_id": "RHSA-2024:0029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0030", "reference_id": "RHSA-2024:0030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0030" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1868042", "reference_id": "show_bug.cgi?id=1868042", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1868042" }, { "reference_url": "https://usn.ubuntu.com/6563-1/", "reference_id": "USN-6563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6563-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-6862" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5qf5-d44c-t7gu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46024?format=api", "vulnerability_id": "VCID-697p-cpq8-1qax", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32205.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32205.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32205", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41298", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41292", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41406", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42001", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42034", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.41983", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42031", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42005", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42012", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.41997", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42025", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.41951", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196736", "reference_id": "2196736", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196736" }, { "reference_url": "https://security.gentoo.org/glsa/202312-03", "reference_id": "GLSA-202312-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202312-03" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16", "reference_id": "mfsa2023-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-17", "reference_id": "mfsa2023-17", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-17" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-18", "reference_id": "mfsa2023-18", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3137", "reference_id": "RHSA-2023:3137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3138", "reference_id": "RHSA-2023:3138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3139", "reference_id": "RHSA-2023:3139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3140", "reference_id": "RHSA-2023:3140", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3140" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3141", "reference_id": "RHSA-2023:3141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3142", "reference_id": "RHSA-2023:3142", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3142" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3143", "reference_id": "RHSA-2023:3143", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3143" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3149", "reference_id": "RHSA-2023:3149", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3149" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3150", "reference_id": "RHSA-2023:3150", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3150" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3151", "reference_id": "RHSA-2023:3151", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3151" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3152", "reference_id": "RHSA-2023:3152", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3152" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3153", "reference_id": "RHSA-2023:3153", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3153" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3154", "reference_id": "RHSA-2023:3154", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3154" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3155", "reference_id": "RHSA-2023:3155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3220", "reference_id": "RHSA-2023:3220", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3221", "reference_id": "RHSA-2023:3221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3221" }, { "reference_url": "https://usn.ubuntu.com/6074-1/", "reference_id": "USN-6074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6074-1/" }, { "reference_url": "https://usn.ubuntu.com/6075-1/", "reference_id": "USN-6075-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6075-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-32205" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-697p-cpq8-1qax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61483?format=api", "vulnerability_id": "VCID-6q8f-csj4-vkhb", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5723", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37461", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44344", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44366", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44303", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44354", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4436", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44345", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.444", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44391", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4432", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44233", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44377", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5723" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45" }, { "reference_url": "https://usn.ubuntu.com/6456-1/", "reference_id": "USN-6456-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6456-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-5723" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6q8f-csj4-vkhb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61475?format=api", "vulnerability_id": "VCID-7hye-1c3x-cubf", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4058", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52669", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.53822", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.53849", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.53823", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.53875", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.53873", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.53921", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.53887", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.53925", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.53931", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.53912", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.53879", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.53903", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4058" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-4058" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7hye-1c3x-cubf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61504?format=api", "vulnerability_id": "VCID-8243-6pew-wuaj", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34415", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24702", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28727", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28774", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28582", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28647", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28688", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28689", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28645", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28598", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29777", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29755", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29711", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29632", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34415" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-20", "reference_id": "mfsa2023-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-20" }, { "reference_url": "https://usn.ubuntu.com/6143-1/", "reference_id": "USN-6143-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6143-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-34415" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8243-6pew-wuaj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61481?format=api", "vulnerability_id": "VCID-8h3r-nznt-jff7", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5175", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57512", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58514", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58504", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58563", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58579", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58559", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58539", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58574", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58578", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58524", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58534", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58556", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5175" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-41", "reference_id": "mfsa2023-41", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-41" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-41/", "reference_id": "mfsa2023-41", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:03Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-41/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1849704", "reference_id": "show_bug.cgi?id=1849704", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:03Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1849704" }, { "reference_url": "https://usn.ubuntu.com/6404-1/", "reference_id": "USN-6404-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6404-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-5175" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8h3r-nznt-jff7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61512?format=api", "vulnerability_id": "VCID-8r1a-6vz3-r3a9", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37212", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46864", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54179", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54209", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54184", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54237", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54233", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54265", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54243", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54286", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54229", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54282", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37212" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22", "reference_id": "mfsa2023-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22" }, { "reference_url": "https://usn.ubuntu.com/6201-1/", "reference_id": "USN-6201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6201-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-37212" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8r1a-6vz3-r3a9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61491?format=api", "vulnerability_id": "VCID-9saf-1zax-5ycy", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6865.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6865.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6865", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61568", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61552", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61565", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00682", "scoring_system": "epss", "scoring_elements": "0.71603", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00682", "scoring_system": "epss", "scoring_elements": "0.71614", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00682", "scoring_system": "epss", "scoring_elements": "0.71621", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00682", "scoring_system": "epss", "scoring_elements": "0.71602", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00682", "scoring_system": "epss", "scoring_elements": "0.71647", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00682", "scoring_system": "epss", "scoring_elements": "0.71652", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00682", "scoring_system": "epss", "scoring_elements": "0.71637", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00682", "scoring_system": "epss", "scoring_elements": "0.71572", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00682", "scoring_system": "epss", "scoring_elements": "0.7159", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00682", "scoring_system": "epss", "scoring_elements": "0.71563", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255361", "reference_id": "2255361", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255361" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0011", "reference_id": "RHSA-2024:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0012", "reference_id": "RHSA-2024:0012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0012" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0019", "reference_id": "RHSA-2024:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0021", "reference_id": "RHSA-2024:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0022", "reference_id": "RHSA-2024:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0023", "reference_id": "RHSA-2024:0023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0024", "reference_id": "RHSA-2024:0024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0025", "reference_id": "RHSA-2024:0025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0026", "reference_id": "RHSA-2024:0026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0026" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-6865" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9saf-1zax-5ycy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46041?format=api", "vulnerability_id": "VCID-9the-k9nt-4bdg", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34416.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34416.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34416", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49222", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49204", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49195", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49199", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49174", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49202", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49153", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49208", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.5106", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51067", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53579", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53604", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53567", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34416" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34414", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34414" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34416", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34416" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2212842", "reference_id": "2212842", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2212842" }, { "reference_url": "https://security.gentoo.org/glsa/202312-03", "reference_id": "GLSA-202312-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202312-03" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-19", "reference_id": "mfsa2023-19", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-19" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-20", "reference_id": "mfsa2023-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-20" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-21", "reference_id": "mfsa2023-21", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3560", "reference_id": "RHSA-2023:3560", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3560" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3561", "reference_id": "RHSA-2023:3561", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3561" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3562", "reference_id": "RHSA-2023:3562", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3562" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3563", "reference_id": "RHSA-2023:3563", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3563" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3564", "reference_id": "RHSA-2023:3564", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3564" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3565", "reference_id": "RHSA-2023:3565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3566", "reference_id": "RHSA-2023:3566", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3566" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3567", "reference_id": "RHSA-2023:3567", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3567" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3578", "reference_id": "RHSA-2023:3578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3578" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3579", "reference_id": "RHSA-2023:3579", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3579" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3587", "reference_id": "RHSA-2023:3587", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3587" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3588", "reference_id": "RHSA-2023:3588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3589", "reference_id": "RHSA-2023:3589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3589" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3590", "reference_id": "RHSA-2023:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3596", "reference_id": "RHSA-2023:3596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3597", "reference_id": "RHSA-2023:3597", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3597" }, { "reference_url": "https://usn.ubuntu.com/6143-1/", "reference_id": "USN-6143-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6143-1/" }, { "reference_url": "https://usn.ubuntu.com/6147-1/", "reference_id": "USN-6147-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6147-1/" }, { "reference_url": "https://usn.ubuntu.com/6214-1/", "reference_id": "USN-6214-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6214-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-34416" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9the-k9nt-4bdg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51434?format=api", "vulnerability_id": "VCID-9z3s-qfbc-vbdc", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6859.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6859.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00375", "scoring_system": "epss", "scoring_elements": "0.59159", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00375", "scoring_system": "epss", "scoring_elements": "0.59175", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.6157", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63625", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63656", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63608", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63645", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63654", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63641", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63583", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63609", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63573", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255364", "reference_id": "2255364", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255364" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0001", "reference_id": "RHSA-2024:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0002", "reference_id": "RHSA-2024:0002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0003", "reference_id": "RHSA-2024:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0004", "reference_id": "RHSA-2024:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0005", "reference_id": "RHSA-2024:0005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0011", "reference_id": "RHSA-2024:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0012", "reference_id": "RHSA-2024:0012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0012" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0019", "reference_id": "RHSA-2024:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0021", "reference_id": "RHSA-2024:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0022", "reference_id": "RHSA-2024:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0023", "reference_id": "RHSA-2024:0023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0024", "reference_id": "RHSA-2024:0024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0025", "reference_id": "RHSA-2024:0025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0026", "reference_id": "RHSA-2024:0026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0027", "reference_id": "RHSA-2024:0027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0028", "reference_id": "RHSA-2024:0028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0029", "reference_id": "RHSA-2024:0029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0030", "reference_id": "RHSA-2024:0030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0030" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" }, { "reference_url": "https://usn.ubuntu.com/6563-1/", "reference_id": "USN-6563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6563-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-6859" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9z3s-qfbc-vbdc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46037?format=api", "vulnerability_id": "VCID-a2as-nfu2-ykax", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32214.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32214.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32214", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45719", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45749", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45731", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45707", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45727", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45675", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47721", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.4778", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47731", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47713", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47787", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32214" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196743", "reference_id": "2196743", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196743" }, { "reference_url": "https://security.gentoo.org/glsa/202312-03", "reference_id": "GLSA-202312-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202312-03" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16", "reference_id": "mfsa2023-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-17", "reference_id": "mfsa2023-17", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-17" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-18", "reference_id": "mfsa2023-18", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-18" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-32214" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a2as-nfu2-ykax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61495?format=api", "vulnerability_id": "VCID-a3g7-atnx-jyg4", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6869", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.33723", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.40051", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.40052", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.40077", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.4004", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.40021", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.4007", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.40041", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.39963", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.39792", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.40078", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.39999", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.40066", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6869" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-56/", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-07T20:22:28Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-56/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1799036", "reference_id": "show_bug.cgi?id=1799036", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-07T20:22:28Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1799036" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-6869" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a3g7-atnx-jyg4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61486?format=api", "vulnerability_id": "VCID-a9j8-ync3-jfgy", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5758", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53119", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53057", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53145", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.5313", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53113", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53154", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53162", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53144", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53109", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53082", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.5305", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53101", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53094", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5758" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-48", "reference_id": "mfsa2023-48", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-48" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-48/", "reference_id": "mfsa2023-48", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-12T14:59:16Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-48/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1850019", "reference_id": "show_bug.cgi?id=1850019", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-12T14:59:16Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1850019" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-5758" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a9j8-ync3-jfgy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61510?format=api", "vulnerability_id": "VCID-avqy-uk9j-2kev", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37209", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00232", "scoring_system": "epss", "scoring_elements": "0.46089", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00304", "scoring_system": "epss", "scoring_elements": "0.53615", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00304", "scoring_system": "epss", "scoring_elements": "0.53643", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00304", "scoring_system": "epss", "scoring_elements": "0.53611", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00304", "scoring_system": "epss", "scoring_elements": "0.53662", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00304", "scoring_system": "epss", "scoring_elements": "0.5366", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00304", "scoring_system": "epss", "scoring_elements": "0.53692", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00304", "scoring_system": "epss", "scoring_elements": "0.53676", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00304", "scoring_system": "epss", "scoring_elements": "0.53713", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00304", "scoring_system": "epss", "scoring_elements": "0.53718", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00304", "scoring_system": "epss", "scoring_elements": "0.537", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00304", "scoring_system": "epss", "scoring_elements": "0.53709", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37209" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22", "reference_id": "mfsa2023-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22" }, { "reference_url": "https://usn.ubuntu.com/6201-1/", "reference_id": "USN-6201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6201-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-37209" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-avqy-uk9j-2kev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61497?format=api", "vulnerability_id": "VCID-azpr-25fb-5qba", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6871", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37556", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37962", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37839", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37889", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37902", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37917", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37881", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37856", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37882", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.3782", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37578", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6871" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-6871" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-azpr-25fb-5qba" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61505?format=api", "vulnerability_id": "VCID-brmh-yppw-tqbh", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34417", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54455", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.5961", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59635", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59605", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59656", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59669", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59688", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59671", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59652", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.6132", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61325", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61305", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61292", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34417" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-20", "reference_id": "mfsa2023-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-20" }, { "reference_url": "https://usn.ubuntu.com/6143-1/", "reference_id": "USN-6143-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6143-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-34417" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-brmh-yppw-tqbh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51435?format=api", "vulnerability_id": "VCID-bw96-5g6y-j3c4", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6860.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6860.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00434", "scoring_system": "epss", "scoring_elements": "0.62881", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63638", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63657", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64619", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64653", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.6464", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64612", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64648", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64659", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64636", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64584", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64613", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64571", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255365", "reference_id": "2255365", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255365" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0001", "reference_id": "RHSA-2024:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0002", "reference_id": "RHSA-2024:0002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0003", "reference_id": "RHSA-2024:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0004", "reference_id": "RHSA-2024:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0005", "reference_id": "RHSA-2024:0005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0011", "reference_id": "RHSA-2024:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0012", "reference_id": "RHSA-2024:0012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0012" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0019", "reference_id": "RHSA-2024:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0021", "reference_id": "RHSA-2024:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0022", "reference_id": "RHSA-2024:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0023", "reference_id": "RHSA-2024:0023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0024", "reference_id": "RHSA-2024:0024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0025", "reference_id": "RHSA-2024:0025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0026", "reference_id": "RHSA-2024:0026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0027", "reference_id": "RHSA-2024:0027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0028", "reference_id": "RHSA-2024:0028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0029", "reference_id": "RHSA-2024:0029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0030", "reference_id": "RHSA-2024:0030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0030" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" }, { "reference_url": "https://usn.ubuntu.com/6563-1/", "reference_id": "USN-6563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6563-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-6860" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bw96-5g6y-j3c4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61484?format=api", "vulnerability_id": "VCID-cr2w-ffbf-rfdu", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5729", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.3655", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36927", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36959", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36791", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36842", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36858", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36866", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36831", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36806", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36852", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36835", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36777", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.36881", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5729" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45" }, { "reference_url": "https://usn.ubuntu.com/6456-1/", "reference_id": "USN-6456-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6456-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-5729" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cr2w-ffbf-rfdu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61506?format=api", "vulnerability_id": "VCID-e48r-fz4d-77c3", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37203", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13488", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18292", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18189", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18142", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18093", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18035", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18048", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18082", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1799", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18343", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18045", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18184", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37203" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22", "reference_id": "mfsa2023-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-22/", "reference_id": "mfsa2023-22", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:50Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-22/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=291640", "reference_id": "show_bug.cgi?id=291640", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:50Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=291640" }, { "reference_url": "https://usn.ubuntu.com/6201-1/", "reference_id": "USN-6201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6201-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-37203" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e48r-fz4d-77c3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46030?format=api", "vulnerability_id": "VCID-f4xy-kftc-mug2", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32207.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32207.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32207", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.50013", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.50009", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.50048", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49987", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.50015", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.50031", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.50014", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.5002", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49966", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.50046", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.5", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.50004", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196738", "reference_id": "2196738", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196738" }, { "reference_url": "https://security.gentoo.org/glsa/202312-03", "reference_id": "GLSA-202312-03", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-31T15:11:27Z/" } ], "url": "https://security.gentoo.org/glsa/202312-03" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16", "reference_id": "mfsa2023-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-16/", "reference_id": "mfsa2023-16", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-31T15:11:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-16/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-17", "reference_id": "mfsa2023-17", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-17" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-17/", "reference_id": "mfsa2023-17", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-31T15:11:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-17/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-18", "reference_id": "mfsa2023-18", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-18" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-18/", "reference_id": "mfsa2023-18", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-31T15:11:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-18/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3137", "reference_id": "RHSA-2023:3137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3138", "reference_id": "RHSA-2023:3138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3139", "reference_id": "RHSA-2023:3139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3140", "reference_id": "RHSA-2023:3140", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3140" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3141", "reference_id": "RHSA-2023:3141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3142", "reference_id": "RHSA-2023:3142", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3142" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3143", "reference_id": "RHSA-2023:3143", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3143" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3149", "reference_id": "RHSA-2023:3149", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3149" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3150", "reference_id": "RHSA-2023:3150", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3150" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3151", "reference_id": "RHSA-2023:3151", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3151" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3152", "reference_id": "RHSA-2023:3152", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3152" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3153", "reference_id": "RHSA-2023:3153", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3153" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3154", "reference_id": "RHSA-2023:3154", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3154" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3155", "reference_id": "RHSA-2023:3155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3220", "reference_id": "RHSA-2023:3220", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3221", "reference_id": "RHSA-2023:3221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3221" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1826116", "reference_id": "show_bug.cgi?id=1826116", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-31T15:11:27Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1826116" }, { "reference_url": "https://usn.ubuntu.com/6074-1/", "reference_id": "USN-6074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6074-1/" }, { "reference_url": "https://usn.ubuntu.com/6075-1/", "reference_id": "USN-6075-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6075-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-32207" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f4xy-kftc-mug2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51438?format=api", "vulnerability_id": "VCID-f6qv-znt2-2bd5", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6863.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6863.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6863", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64403", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.6437", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.6439", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66189", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66222", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66209", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66178", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66214", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66228", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66203", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66146", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66173", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66141", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255369", "reference_id": "2255369", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255369" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0001", "reference_id": "RHSA-2024:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0002", "reference_id": "RHSA-2024:0002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0003", "reference_id": "RHSA-2024:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0004", "reference_id": "RHSA-2024:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0005", "reference_id": "RHSA-2024:0005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0011", "reference_id": "RHSA-2024:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0012", "reference_id": "RHSA-2024:0012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0012" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0019", "reference_id": "RHSA-2024:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0021", "reference_id": "RHSA-2024:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0022", "reference_id": "RHSA-2024:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0023", "reference_id": "RHSA-2024:0023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0024", "reference_id": "RHSA-2024:0024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0025", "reference_id": "RHSA-2024:0025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0026", "reference_id": "RHSA-2024:0026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0027", "reference_id": "RHSA-2024:0027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0028", "reference_id": "RHSA-2024:0028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0029", "reference_id": "RHSA-2024:0029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0030", "reference_id": "RHSA-2024:0030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0030" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" }, { "reference_url": "https://usn.ubuntu.com/6563-1/", "reference_id": "USN-6563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6563-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-6863" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f6qv-znt2-2bd5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61492?format=api", "vulnerability_id": "VCID-gd3w-dp7g-c7bv", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6866", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01124", "scoring_system": "epss", "scoring_elements": "0.78334", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.7935", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.79358", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.79394", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.79417", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.79401", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.7939", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.79422", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.7942", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.79455", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.79372", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.79385", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6866" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-56/", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-27T18:53:04Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-56/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1849037", "reference_id": "show_bug.cgi?id=1849037", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-27T18:53:04Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1849037" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-6866" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gd3w-dp7g-c7bv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46032?format=api", "vulnerability_id": "VCID-ghqe-gsw9-c3e4", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32211.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32211.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32211", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34741", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35041", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35069", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35073", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35038", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35014", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35052", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35037", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34991", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3476", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3509", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35118", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34997", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196740", "reference_id": "2196740", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196740" }, { "reference_url": "https://security.gentoo.org/glsa/202312-03", "reference_id": "GLSA-202312-03", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:05Z/" } ], "url": "https://security.gentoo.org/glsa/202312-03" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16", "reference_id": "mfsa2023-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-16/", "reference_id": "mfsa2023-16", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:05Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-16/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-17", "reference_id": "mfsa2023-17", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-17" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-17/", "reference_id": "mfsa2023-17", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:05Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-17/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-18", "reference_id": "mfsa2023-18", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-18" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-18/", "reference_id": "mfsa2023-18", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:05Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-18/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3137", "reference_id": "RHSA-2023:3137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3138", "reference_id": "RHSA-2023:3138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3139", "reference_id": "RHSA-2023:3139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3140", "reference_id": "RHSA-2023:3140", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3140" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3141", "reference_id": "RHSA-2023:3141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3142", "reference_id": "RHSA-2023:3142", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3142" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3143", "reference_id": "RHSA-2023:3143", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3143" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3149", "reference_id": "RHSA-2023:3149", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3149" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3150", "reference_id": "RHSA-2023:3150", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3150" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3151", "reference_id": "RHSA-2023:3151", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3151" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3152", "reference_id": "RHSA-2023:3152", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3152" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3153", "reference_id": "RHSA-2023:3153", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3153" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3154", "reference_id": "RHSA-2023:3154", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3154" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3155", "reference_id": "RHSA-2023:3155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3220", "reference_id": "RHSA-2023:3220", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3221", "reference_id": "RHSA-2023:3221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3221" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1823379", "reference_id": "show_bug.cgi?id=1823379", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:05Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1823379" }, { "reference_url": "https://usn.ubuntu.com/6074-1/", "reference_id": "USN-6074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6074-1/" }, { "reference_url": "https://usn.ubuntu.com/6075-1/", "reference_id": "USN-6075-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6075-1/" }, { "reference_url": "https://usn.ubuntu.com/6120-1/", "reference_id": "USN-6120-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6120-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-32211" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ghqe-gsw9-c3e4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61508?format=api", "vulnerability_id": "VCID-hgwp-3pm8-xugw", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37205", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40738", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48139", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48159", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48109", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48162", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48157", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.4818", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48164", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48217", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48212", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48168", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48148", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48153", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37205" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22", "reference_id": "mfsa2023-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22" }, { "reference_url": "https://usn.ubuntu.com/6201-1/", "reference_id": "USN-6201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6201-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-37205" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hgwp-3pm8-xugw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51432?format=api", "vulnerability_id": "VCID-kskc-agaw-8bcr", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6857.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6857.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40745", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40775", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40755", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40783", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40707", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40757", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40764", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.4073", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40749", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45428", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45504", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45418", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255362", "reference_id": "2255362", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255362" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0001", "reference_id": "RHSA-2024:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0002", "reference_id": "RHSA-2024:0002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0003", "reference_id": "RHSA-2024:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0004", "reference_id": "RHSA-2024:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0005", "reference_id": "RHSA-2024:0005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0011", "reference_id": "RHSA-2024:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0012", "reference_id": "RHSA-2024:0012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0012" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0019", "reference_id": "RHSA-2024:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0021", "reference_id": "RHSA-2024:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0022", "reference_id": "RHSA-2024:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0023", "reference_id": "RHSA-2024:0023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0024", "reference_id": "RHSA-2024:0024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0025", "reference_id": "RHSA-2024:0025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0026", "reference_id": "RHSA-2024:0026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0027", "reference_id": "RHSA-2024:0027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0028", "reference_id": "RHSA-2024:0028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0029", "reference_id": "RHSA-2024:0029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0030", "reference_id": "RHSA-2024:0030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0030" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" }, { "reference_url": "https://usn.ubuntu.com/6563-1/", "reference_id": "USN-6563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6563-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-6857" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kskc-agaw-8bcr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46040?format=api", "vulnerability_id": "VCID-ngja-2eff-h7hk", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34414.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34414.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34414", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15011", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15009", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14972", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18219", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18273", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18377", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18432", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18134", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18275", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18228", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18177", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19255", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19264", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34414" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34414", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34414" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34416", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34416" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2212841", "reference_id": "2212841", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2212841" }, { "reference_url": "https://security.gentoo.org/glsa/202312-03", "reference_id": "GLSA-202312-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202312-03" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-19", "reference_id": "mfsa2023-19", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-19" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-20", "reference_id": "mfsa2023-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-20" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-21", "reference_id": "mfsa2023-21", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3560", "reference_id": "RHSA-2023:3560", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3560" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3561", "reference_id": "RHSA-2023:3561", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3561" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3562", "reference_id": "RHSA-2023:3562", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3562" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3563", "reference_id": "RHSA-2023:3563", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3563" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3564", "reference_id": "RHSA-2023:3564", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3564" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3565", "reference_id": "RHSA-2023:3565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3566", "reference_id": "RHSA-2023:3566", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3566" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3567", "reference_id": "RHSA-2023:3567", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3567" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3578", "reference_id": "RHSA-2023:3578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3578" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3579", "reference_id": "RHSA-2023:3579", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3579" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3587", "reference_id": "RHSA-2023:3587", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3587" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3588", "reference_id": "RHSA-2023:3588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3589", "reference_id": "RHSA-2023:3589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3589" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3590", "reference_id": "RHSA-2023:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3596", "reference_id": "RHSA-2023:3596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3597", "reference_id": "RHSA-2023:3597", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3597" }, { "reference_url": "https://usn.ubuntu.com/6143-1/", "reference_id": "USN-6143-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6143-1/" }, { "reference_url": "https://usn.ubuntu.com/6214-1/", "reference_id": "USN-6214-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6214-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-34414" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ngja-2eff-h7hk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61502?format=api", "vulnerability_id": "VCID-p1te-bjdc-qke9", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32210", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.39849", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45216", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45239", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45181", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45236", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45257", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45226", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45225", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.4735", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47345", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47295", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47281", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32210" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16", "reference_id": "mfsa2023-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16" }, { "reference_url": "https://usn.ubuntu.com/6074-1/", "reference_id": "USN-6074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6074-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-32210" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p1te-bjdc-qke9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61482?format=api", "vulnerability_id": "VCID-p3yc-cddb-hkhe", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5722", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37693", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37728", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37376", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37613", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37675", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37753", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37631", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37682", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37695", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37674", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37646", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.43919", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5722" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-45/", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-12T20:17:21Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-45/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1738426", "reference_id": "show_bug.cgi?id=1738426", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-12T20:17:21Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1738426" }, { "reference_url": "https://usn.ubuntu.com/6456-1/", "reference_id": "USN-6456-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6456-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-5722" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p3yc-cddb-hkhe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61490?format=api", "vulnerability_id": "VCID-pa3c-jpdg-ukhh", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6213", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45064", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45141", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45164", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45106", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45158", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.4518", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45147", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45149", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45199", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45193", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45144", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45057", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6213" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-49", "reference_id": "mfsa2023-49", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-49" }, { "reference_url": "https://usn.ubuntu.com/6509-1/", "reference_id": "USN-6509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6509-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-6213" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pa3c-jpdg-ukhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51439?format=api", "vulnerability_id": "VCID-pepm-1t68-uuf1", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6864.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6864.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65732", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65706", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65721", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0059", "scoring_system": "epss", "scoring_elements": "0.69182", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0059", "scoring_system": "epss", "scoring_elements": "0.69223", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0059", "scoring_system": "epss", "scoring_elements": "0.69208", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0059", "scoring_system": "epss", "scoring_elements": "0.6918", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0059", "scoring_system": "epss", "scoring_elements": "0.69219", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0059", "scoring_system": "epss", "scoring_elements": "0.69228", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0059", "scoring_system": "epss", "scoring_elements": "0.69201", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0059", "scoring_system": "epss", "scoring_elements": "0.6913", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0059", "scoring_system": "epss", "scoring_elements": "0.69151", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0059", "scoring_system": "epss", "scoring_elements": "0.69132", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255370", "reference_id": "2255370", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255370" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0001", "reference_id": "RHSA-2024:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0002", "reference_id": "RHSA-2024:0002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0003", "reference_id": "RHSA-2024:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0004", "reference_id": "RHSA-2024:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0005", "reference_id": "RHSA-2024:0005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0011", "reference_id": "RHSA-2024:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0012", "reference_id": "RHSA-2024:0012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0012" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0019", "reference_id": "RHSA-2024:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0021", "reference_id": "RHSA-2024:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0022", "reference_id": "RHSA-2024:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0023", "reference_id": "RHSA-2024:0023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0024", "reference_id": "RHSA-2024:0024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0025", "reference_id": "RHSA-2024:0025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0026", "reference_id": "RHSA-2024:0026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0027", "reference_id": "RHSA-2024:0027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0028", "reference_id": "RHSA-2024:0028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0029", "reference_id": "RHSA-2024:0029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0030", "reference_id": "RHSA-2024:0030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0030" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" }, { "reference_url": "https://usn.ubuntu.com/6563-1/", "reference_id": "USN-6563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6563-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-6864" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pepm-1t68-uuf1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61476?format=api", "vulnerability_id": "VCID-pgst-zjuv-guee", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4579", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.31841", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37902", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37856", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37882", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.3782", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37578", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37962", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37839", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37889", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37917", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37881", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4579" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-34/", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T17:51:58Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-34/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1842766", "reference_id": "show_bug.cgi?id=1842766", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T17:51:58Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1842766" }, { "reference_url": "https://usn.ubuntu.com/6320-1/", "reference_id": "USN-6320-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6320-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-4579" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pgst-zjuv-guee" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61489?format=api", "vulnerability_id": "VCID-pn8f-h9r2-xug8", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6211", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33047", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33349", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33381", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33212", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33255", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.3329", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33294", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33253", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.3323", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33269", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33246", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.3321", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33065", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6211" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-49", "reference_id": "mfsa2023-49", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-49" }, { "reference_url": "https://usn.ubuntu.com/6509-1/", "reference_id": "USN-6509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6509-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-6211" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pn8f-h9r2-xug8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51431?format=api", "vulnerability_id": "VCID-qdqj-rhcr-wbca", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6856.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6856.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10471", "scoring_system": "epss", "scoring_elements": "0.9327", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.10471", "scoring_system": "epss", "scoring_elements": "0.93273", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.10471", "scoring_system": "epss", "scoring_elements": "0.93268", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.10986", "scoring_system": "epss", "scoring_elements": "0.93421", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.10986", "scoring_system": "epss", "scoring_elements": "0.93422", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10986", "scoring_system": "epss", "scoring_elements": "0.93441", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.10986", "scoring_system": "epss", "scoring_elements": "0.93446", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.10986", "scoring_system": "epss", "scoring_elements": "0.93416", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10986", "scoring_system": "epss", "scoring_elements": "0.93397", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10986", "scoring_system": "epss", "scoring_elements": "0.93405", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10986", "scoring_system": "epss", "scoring_elements": "0.93413", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255360", "reference_id": "2255360", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255360" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0001", "reference_id": "RHSA-2024:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0002", "reference_id": "RHSA-2024:0002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0003", "reference_id": "RHSA-2024:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0004", "reference_id": "RHSA-2024:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0005", "reference_id": "RHSA-2024:0005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0011", "reference_id": "RHSA-2024:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0012", "reference_id": "RHSA-2024:0012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0012" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0019", "reference_id": "RHSA-2024:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0021", "reference_id": "RHSA-2024:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0022", "reference_id": "RHSA-2024:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0023", "reference_id": "RHSA-2024:0023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0024", "reference_id": "RHSA-2024:0024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0025", "reference_id": "RHSA-2024:0025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0026", "reference_id": "RHSA-2024:0026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0027", "reference_id": "RHSA-2024:0027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0028", "reference_id": "RHSA-2024:0028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0029", "reference_id": "RHSA-2024:0029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0030", "reference_id": "RHSA-2024:0030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0030" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" }, { "reference_url": "https://usn.ubuntu.com/6563-1/", "reference_id": "USN-6563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6563-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-6856" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qdqj-rhcr-wbca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61485?format=api", "vulnerability_id": "VCID-qqn4-w66p-vfhd", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5731", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60603", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60537", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60563", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60532", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60581", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60597", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60621", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60606", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60585", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60626", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60631", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60619", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00405", "scoring_system": "epss", "scoring_elements": "0.6107", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5731" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45" }, { "reference_url": "https://usn.ubuntu.com/6456-1/", "reference_id": "USN-6456-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6456-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-5731" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qqn4-w66p-vfhd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46039?format=api", "vulnerability_id": "VCID-rafq-49c4-u7g6", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32215.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32215.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32215", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00268", "scoring_system": "epss", "scoring_elements": "0.50232", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00268", "scoring_system": "epss", "scoring_elements": "0.50279", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00268", "scoring_system": "epss", "scoring_elements": "0.50253", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00268", "scoring_system": "epss", "scoring_elements": "0.50226", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00268", "scoring_system": "epss", "scoring_elements": "0.5022", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00268", "scoring_system": "epss", "scoring_elements": "0.50249", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00268", "scoring_system": "epss", "scoring_elements": "0.50199", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00268", "scoring_system": "epss", "scoring_elements": "0.50252", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00268", "scoring_system": "epss", "scoring_elements": "0.50245", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00268", "scoring_system": "epss", "scoring_elements": "0.50272", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00268", "scoring_system": "epss", "scoring_elements": "0.50246", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00268", "scoring_system": "epss", "scoring_elements": "0.50234", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196753", "reference_id": "2196753", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196753" }, { "reference_url": "https://security.gentoo.org/glsa/202312-03", "reference_id": "GLSA-202312-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202312-03" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16", "reference_id": "mfsa2023-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-17", "reference_id": "mfsa2023-17", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-17" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-18", "reference_id": "mfsa2023-18", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3137", "reference_id": "RHSA-2023:3137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3138", "reference_id": "RHSA-2023:3138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3139", "reference_id": "RHSA-2023:3139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3140", "reference_id": "RHSA-2023:3140", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3140" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3141", "reference_id": "RHSA-2023:3141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3142", "reference_id": "RHSA-2023:3142", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3142" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3143", "reference_id": "RHSA-2023:3143", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3143" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3149", "reference_id": "RHSA-2023:3149", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3149" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3150", "reference_id": "RHSA-2023:3150", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3150" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3151", "reference_id": "RHSA-2023:3151", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3151" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3152", "reference_id": "RHSA-2023:3152", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3152" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3153", "reference_id": "RHSA-2023:3153", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3153" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3154", "reference_id": "RHSA-2023:3154", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3154" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3155", "reference_id": "RHSA-2023:3155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3220", "reference_id": "RHSA-2023:3220", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3221", "reference_id": "RHSA-2023:3221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3221" }, { "reference_url": "https://usn.ubuntu.com/6074-1/", "reference_id": "USN-6074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6074-1/" }, { "reference_url": "https://usn.ubuntu.com/6075-1/", "reference_id": "USN-6075-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6075-1/" }, { "reference_url": "https://usn.ubuntu.com/6120-1/", "reference_id": "USN-6120-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6120-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-32215" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rafq-49c4-u7g6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46036?format=api", "vulnerability_id": "VCID-rarq-q7qa-nud7", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32213.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32213.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32213", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47455", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.4746", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47447", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47937", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47956", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47933", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47943", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47997", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47992", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47932", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47914", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47936", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47884", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196742", "reference_id": "2196742", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196742" }, { "reference_url": "https://security.gentoo.org/glsa/202312-03", "reference_id": "GLSA-202312-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202312-03" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16", "reference_id": "mfsa2023-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-17", "reference_id": "mfsa2023-17", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-17" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-18", "reference_id": "mfsa2023-18", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3137", "reference_id": "RHSA-2023:3137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3138", "reference_id": "RHSA-2023:3138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3139", "reference_id": "RHSA-2023:3139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3140", "reference_id": "RHSA-2023:3140", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3140" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3141", "reference_id": "RHSA-2023:3141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3142", "reference_id": "RHSA-2023:3142", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3142" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3143", "reference_id": "RHSA-2023:3143", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3143" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3149", "reference_id": "RHSA-2023:3149", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3149" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3150", "reference_id": "RHSA-2023:3150", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3150" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3151", "reference_id": "RHSA-2023:3151", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3151" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3152", "reference_id": "RHSA-2023:3152", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3152" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3153", "reference_id": "RHSA-2023:3153", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3153" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3154", "reference_id": "RHSA-2023:3154", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3154" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3155", "reference_id": "RHSA-2023:3155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3220", "reference_id": "RHSA-2023:3220", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3221", "reference_id": "RHSA-2023:3221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3221" }, { "reference_url": "https://usn.ubuntu.com/6074-1/", "reference_id": "USN-6074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6074-1/" }, { "reference_url": "https://usn.ubuntu.com/6075-1/", "reference_id": "USN-6075-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6075-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-32213" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rarq-q7qa-nud7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61479?format=api", "vulnerability_id": "VCID-rawu-vyqx-2ker", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5172", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47932", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55266", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55321", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55333", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55312", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55293", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.5533", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55335", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55313", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.5525", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.5529", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55271", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55322", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5172" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-41", "reference_id": "mfsa2023-41", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-41" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-41/", "reference_id": "mfsa2023-41", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:05Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-41/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1852218", "reference_id": "show_bug.cgi?id=1852218", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:05Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1852218" }, { "reference_url": "https://usn.ubuntu.com/6404-1/", "reference_id": "USN-6404-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6404-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-5172" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rawu-vyqx-2ker" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61488?format=api", "vulnerability_id": "VCID-rx2r-8htx-rfbt", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6210", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.39777", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.40051", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.40078", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.39999", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.40052", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.40066", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.40077", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.4004", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.40021", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.4007", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.40041", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.39963", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.39792", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6210" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-49", "reference_id": "mfsa2023-49", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-49" }, { "reference_url": "https://usn.ubuntu.com/6509-1/", "reference_id": "USN-6509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6509-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-6210" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rx2r-8htx-rfbt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61480?format=api", "vulnerability_id": "VCID-sgt1-7dt3-yyau", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5173", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41352", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00237", "scoring_system": "epss", "scoring_elements": "0.46822", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00237", "scoring_system": "epss", "scoring_elements": "0.46841", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00237", "scoring_system": "epss", "scoring_elements": "0.4679", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00237", "scoring_system": "epss", "scoring_elements": "0.46845", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00237", "scoring_system": "epss", "scoring_elements": "0.46844", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00237", "scoring_system": "epss", "scoring_elements": "0.46839", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00237", "scoring_system": "epss", "scoring_elements": "0.46847", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00237", "scoring_system": "epss", "scoring_elements": "0.46902", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00237", "scoring_system": "epss", "scoring_elements": "0.46899", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00237", "scoring_system": "epss", "scoring_elements": "0.46831", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00237", "scoring_system": "epss", "scoring_elements": "0.46867", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5173" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-41", "reference_id": "mfsa2023-41", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-41" }, { "reference_url": "https://usn.ubuntu.com/6404-1/", "reference_id": "USN-6404-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6404-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-5173" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sgt1-7dt3-yyau" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51433?format=api", "vulnerability_id": "VCID-tps4-kxe2-5ugb", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6858.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6858.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.6178", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61764", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61769", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63748", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63723", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63777", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.6376", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63708", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63788", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63778", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63742", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63776", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63791", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255363", "reference_id": "2255363", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255363" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5581", "reference_id": "dsa-5581", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5581" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5582", "reference_id": "dsa-5582", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5582" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-54/", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-54/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-55/", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-55/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-56/", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-56/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html", "reference_id": "msg00020.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html", "reference_id": "msg00021.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0001", "reference_id": "RHSA-2024:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0002", "reference_id": "RHSA-2024:0002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0003", "reference_id": "RHSA-2024:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0004", "reference_id": "RHSA-2024:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0005", "reference_id": "RHSA-2024:0005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0011", "reference_id": "RHSA-2024:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0012", "reference_id": "RHSA-2024:0012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0012" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0019", "reference_id": "RHSA-2024:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0021", "reference_id": "RHSA-2024:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0022", "reference_id": "RHSA-2024:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0023", "reference_id": "RHSA-2024:0023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0024", "reference_id": "RHSA-2024:0024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0025", "reference_id": "RHSA-2024:0025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0026", "reference_id": "RHSA-2024:0026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0027", "reference_id": "RHSA-2024:0027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0028", "reference_id": "RHSA-2024:0028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0029", "reference_id": "RHSA-2024:0029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0030", "reference_id": "RHSA-2024:0030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0030" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1826791", "reference_id": "show_bug.cgi?id=1826791", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1826791" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" }, { "reference_url": "https://usn.ubuntu.com/6563-1/", "reference_id": "USN-6563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6563-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-6858" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tps4-kxe2-5ugb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61507?format=api", "vulnerability_id": "VCID-up33-tw5e-bucs", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37204", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36588", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43342", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.4337", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43308", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.4336", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43375", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43396", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.4335", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43409", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43398", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43332", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43266", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43365", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37204" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22", "reference_id": "mfsa2023-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22" }, { "reference_url": "https://usn.ubuntu.com/6201-1/", "reference_id": "USN-6201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6201-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-37204" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-up33-tw5e-bucs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61477?format=api", "vulnerability_id": "VCID-v4vu-azan-jyev", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5129.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5129.json" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240759", "reference_id": "2240759", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5183", "reference_id": "RHSA-2023:5183", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5183" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5184", "reference_id": "RHSA-2023:5184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5185", "reference_id": "RHSA-2023:5185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5186", "reference_id": "RHSA-2023:5186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5187", "reference_id": "RHSA-2023:5187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5188", "reference_id": "RHSA-2023:5188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5189", "reference_id": "RHSA-2023:5189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5190", "reference_id": "RHSA-2023:5190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5191", "reference_id": "RHSA-2023:5191", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5191" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5192", "reference_id": "RHSA-2023:5192", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5192" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5197", "reference_id": "RHSA-2023:5197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5198", "reference_id": "RHSA-2023:5198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5200", "reference_id": "RHSA-2023:5200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5201", "reference_id": "RHSA-2023:5201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5202", "reference_id": "RHSA-2023:5202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5204", "reference_id": "RHSA-2023:5204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5205", "reference_id": "RHSA-2023:5205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5214", "reference_id": "RHSA-2023:5214", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5214" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5223", "reference_id": "RHSA-2023:5223", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5223" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5224", "reference_id": "RHSA-2023:5224", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5224" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5236", "reference_id": "RHSA-2023:5236", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5236" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5309", "reference_id": "RHSA-2023:5309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5309" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-5129" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v4vu-azan-jyev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/18987?format=api", "vulnerability_id": "VCID-vdzj-kqfy-d3b7", "summary": "libwebp: OOB write in BuildHuffmanTable\nHeap buffer overflow in libwebp allow a remote attacker to perform an out of bounds memory write via a crafted HTML page.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4863.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4863.json" }, { "reference_url": "https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway" }, { "reference_url": "https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4863", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.93606", "scoring_system": "epss", "scoring_elements": "0.99836", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.93606", "scoring_system": "epss", "scoring_elements": "0.99837", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.93606", "scoring_system": "epss", "scoring_elements": "0.99835", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.94083", "scoring_system": "epss", "scoring_elements": "0.99907", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.94083", "scoring_system": "epss", "scoring_elements": "0.99905", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.94117", "scoring_system": "epss", "scoring_elements": "0.99909", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.94117", "scoring_system": "epss", "scoring_elements": "0.9991", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.94117", "scoring_system": "epss", "scoring_elements": "0.99911", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4863" }, { "reference_url": "https://blog.isosceles.com/the-webp-0day", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://blog.isosceles.com/the-webp-0day" }, { "reference_url": "https://bugzilla.suse.com/show_bug.cgi?id=1215231", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1215231" }, { "reference_url": "https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html" }, { "reference_url": "https://crbug.com/1479274", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://crbug.com/1479274" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4863" }, { "reference_url": "https://en.bandisoft.com/honeyview/history", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://en.bandisoft.com/honeyview/history" }, { "reference_url": "https://en.bandisoft.com/honeyview/history/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://en.bandisoft.com/honeyview/history/" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/dlemstra/Magick.NET/releases/tag/13.3.0", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/dlemstra/Magick.NET/releases/tag/13.3.0" }, { "reference_url": "https://github.com/electron/electron/pull/39823", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/electron/electron/pull/39823" }, { "reference_url": "https://github.com/electron/electron/pull/39825", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/electron/electron/pull/39825" }, { "reference_url": "https://github.com/electron/electron/pull/39826", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/electron/electron/pull/39826" }, { "reference_url": "https://github.com/electron/electron/pull/39827", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/electron/electron/pull/39827" }, { "reference_url": "https://github.com/electron/electron/pull/39828", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/electron/electron/pull/39828" }, { "reference_url": "https://github.com/ImageMagick/ImageMagick/discussions/6664", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/ImageMagick/ImageMagick/discussions/6664" }, { "reference_url": "https://github.com/jaredforth/webp/commit/9d4c56e63abecc777df71c702503c3eaabd7dcbc", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/jaredforth/webp/commit/9d4c56e63abecc777df71c702503c3eaabd7dcbc" }, { "reference_url": "https://github.com/jaredforth/webp/pull/30", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/jaredforth/webp/pull/30" }, { "reference_url": "https://github.com/python-pillow/Pillow/pull/7395", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/python-pillow/Pillow/pull/7395" }, { "reference_url": "https://github.com/qnighy/libwebp-sys2-rs/commit/4560c473a76ec8bd8c650f19ddf9d7a44f719f8b", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/qnighy/libwebp-sys2-rs/commit/4560c473a76ec8bd8c650f19ddf9d7a44f719f8b" }, { "reference_url": "https://github.com/qnighy/libwebp-sys2-rs/pull/21", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/qnighy/libwebp-sys2-rs/pull/21" }, { "reference_url": "https://github.com/webmproject/libwebp", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/webmproject/libwebp" }, { "reference_url": "https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a" }, { "reference_url": "https://github.com/webmproject/libwebp/releases/tag/v1.3.2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://github.com/webmproject/libwebp/releases/tag/v1.3.2" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I" }, { "reference_url": "https://news.ycombinator.com/item?id=37478403", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://news.ycombinator.com/item?id=37478403" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4863", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4863" }, { "reference_url": "https://pillow.readthedocs.io/en/stable/releasenotes/10.0.1.html#security", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://pillow.readthedocs.io/en/stable/releasenotes/10.0.1.html#security" }, { "reference_url": "https://rustsec.org/advisories/RUSTSEC-2023-0060.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://rustsec.org/advisories/RUSTSEC-2023-0060.html" }, { "reference_url": "https://rustsec.org/advisories/RUSTSEC-2023-0061.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://rustsec.org/advisories/RUSTSEC-2023-0061.html" }, { "reference_url": "https://security.gentoo.org/glsa/202309-05", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://security.gentoo.org/glsa/202309-05" }, { "reference_url": "https://security.gentoo.org/glsa/202401-10", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://security.gentoo.org/glsa/202401-10" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230929-0011", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20230929-0011" }, { "reference_url": "https://sethmlarson.dev/security-developer-in-residence-weekly-report-16", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://sethmlarson.dev/security-developer-in-residence-weekly-report-16" }, { "reference_url": "https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863" }, { "reference_url": "https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/" }, { "reference_url": "https://www.bentley.com/advisories/be-2023-0001", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.bentley.com/advisories/be-2023-0001" }, { "reference_url": "https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks" }, { "reference_url": "https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks/" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5496", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5496" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5497", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5497" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5498", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5498" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-40", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-40" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/" }, { "reference_url": "https://www.vicarius.io/vsociety/posts/zero-day-webp-vulnerability-cve-2023-4863", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.vicarius.io/vsociety/posts/zero-day-webp-vulnerability-cve-2023-4863" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/21/4", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/21/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/22/1", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/22/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/22/3", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/22/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/22/4", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/22/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/22/5", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/22/5" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/22/6", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/22/6" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/22/7", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/22/7" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/22/8", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/22/8" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/26/1", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/26/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/26/7", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/26/7" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/28/1", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/28/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/28/2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/28/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/28/4", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/28/4" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051787", "reference_id": "1051787", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051787" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238431", "reference_id": "2238431", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238431" }, { "reference_url": "https://www.bentley.com/advisories/be-2023-0001/", "reference_id": "be-2023-0001", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://www.bentley.com/advisories/be-2023-0001/" }, { "reference_url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863", "reference_id": "CVE-2023-4863", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863" }, { "reference_url": "https://security-tracker.debian.org/tracker/CVE-2023-4863", "reference_id": "CVE-2023-4863", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://security-tracker.debian.org/tracker/CVE-2023-4863" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/", "reference_id": "KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230929-0011/", "reference_id": "ntap-20230929-0011", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230929-0011/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5183", "reference_id": "RHSA-2023:5183", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5183" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5184", "reference_id": "RHSA-2023:5184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5185", "reference_id": "RHSA-2023:5185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5186", "reference_id": "RHSA-2023:5186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5187", "reference_id": "RHSA-2023:5187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5188", "reference_id": "RHSA-2023:5188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5189", "reference_id": "RHSA-2023:5189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5190", "reference_id": "RHSA-2023:5190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5191", "reference_id": "RHSA-2023:5191", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5191" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5192", "reference_id": "RHSA-2023:5192", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5192" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5197", "reference_id": "RHSA-2023:5197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5198", "reference_id": "RHSA-2023:5198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5200", "reference_id": "RHSA-2023:5200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5201", "reference_id": "RHSA-2023:5201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5202", "reference_id": "RHSA-2023:5202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5204", "reference_id": "RHSA-2023:5204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5205", "reference_id": "RHSA-2023:5205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5214", "reference_id": "RHSA-2023:5214", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5214" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5222", "reference_id": "RHSA-2023:5222", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5222" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5223", "reference_id": "RHSA-2023:5223", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5223" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5224", "reference_id": "RHSA-2023:5224", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5224" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5236", "reference_id": "RHSA-2023:5236", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5236" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5309", "reference_id": "RHSA-2023:5309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5309" }, { "reference_url": "https://usn.ubuntu.com/6367-1/", "reference_id": "USN-6367-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6367-1/" }, { "reference_url": "https://usn.ubuntu.com/6368-1/", "reference_id": "USN-6368-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6368-1/" }, { "reference_url": "https://usn.ubuntu.com/6369-1/", "reference_id": "USN-6369-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6369-1/" }, { "reference_url": "https://usn.ubuntu.com/6369-2/", "reference_id": "USN-6369-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6369-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-4863", "GHSA-j7hp-h8jx-5ppr" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vdzj-kqfy-d3b7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61500?format=api", "vulnerability_id": "VCID-wjru-492x-fqge", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32208", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44008", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49865", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49891", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49893", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49843", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49898", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49909", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49881", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49882", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51595", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51549", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51617", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51609", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32208" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16", "reference_id": "mfsa2023-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-16/", "reference_id": "mfsa2023-16", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-12T20:03:38Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-16/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1646034", "reference_id": "show_bug.cgi?id=1646034", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-12T20:03:38Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1646034" }, { "reference_url": "https://usn.ubuntu.com/6074-1/", "reference_id": "USN-6074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6074-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-32208" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wjru-492x-fqge" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61503?format=api", "vulnerability_id": "VCID-wk3d-jxen-bbe5", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32216", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0035", "scoring_system": "epss", "scoring_elements": "0.575", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0035", "scoring_system": "epss", "scoring_elements": "0.57471", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0035", "scoring_system": "epss", "scoring_elements": "0.57493", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0035", "scoring_system": "epss", "scoring_elements": "0.5747", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0035", "scoring_system": "epss", "scoring_elements": "0.57523", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0035", "scoring_system": "epss", "scoring_elements": "0.57526", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0035", "scoring_system": "epss", "scoring_elements": "0.57542", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0035", "scoring_system": "epss", "scoring_elements": "0.57519", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00373", "scoring_system": "epss", "scoring_elements": "0.59066", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00373", "scoring_system": "epss", "scoring_elements": "0.59085", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00373", "scoring_system": "epss", "scoring_elements": "0.59089", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00373", "scoring_system": "epss", "scoring_elements": "0.59068", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00373", "scoring_system": "epss", "scoring_elements": "0.59048", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32216" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16", "reference_id": "mfsa2023-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16" }, { "reference_url": "https://usn.ubuntu.com/6074-1/", "reference_id": "USN-6074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6074-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-32216" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wk3d-jxen-bbe5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61509?format=api", "vulnerability_id": "VCID-x21e-e2q4-a3au", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37206", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38796", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45768", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45789", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45739", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45796", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45793", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45784", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.4584", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45833", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.4578", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45709", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45815", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37206" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22", "reference_id": "mfsa2023-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22" }, { "reference_url": "https://usn.ubuntu.com/6201-1/", "reference_id": "USN-6201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6201-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-37206" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x21e-e2q4-a3au" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61494?format=api", "vulnerability_id": "VCID-x4v4-7y4q-mfbs", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6868", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.31841", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32275", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32312", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32136", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32186", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32213", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32215", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32177", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32144", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32178", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32157", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32131", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.31969", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6868" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-6868" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x4v4-7y4q-mfbs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61478?format=api", "vulnerability_id": "VCID-xq67-wxrq-m7hf", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5170", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39087", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00233", "scoring_system": "epss", "scoring_elements": "0.46085", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00233", "scoring_system": "epss", "scoring_elements": "0.46108", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00233", "scoring_system": "epss", "scoring_elements": "0.4617", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00233", "scoring_system": "epss", "scoring_elements": "0.46166", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00233", "scoring_system": "epss", "scoring_elements": "0.46111", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00233", "scoring_system": "epss", "scoring_elements": "0.46091", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00233", "scoring_system": "epss", "scoring_elements": "0.46107", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00233", "scoring_system": "epss", "scoring_elements": "0.46054", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00233", "scoring_system": "epss", "scoring_elements": "0.4611", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00233", "scoring_system": "epss", "scoring_elements": "0.46132", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00233", "scoring_system": "epss", "scoring_elements": "0.46104", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00233", "scoring_system": "epss", "scoring_elements": "0.46113", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5170" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-41", "reference_id": "mfsa2023-41", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-41" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-41/", "reference_id": "mfsa2023-41", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-41/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846686", "reference_id": "show_bug.cgi?id=1846686", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:17Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846686" }, { "reference_url": "https://usn.ubuntu.com/6404-1/", "reference_id": "USN-6404-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6404-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-5170" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xq67-wxrq-m7hf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61501?format=api", "vulnerability_id": "VCID-yx45-47gm-jkde", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32209", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40203", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40239", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40263", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40186", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40238", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40249", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40261", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40223", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41569", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41764", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41738", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41665", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41573", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32209" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16", "reference_id": "mfsa2023-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-16" }, { "reference_url": "https://usn.ubuntu.com/6074-1/", "reference_id": "USN-6074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6074-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-32209" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yx45-47gm-jkde" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61474?format=api", "vulnerability_id": "VCID-yxag-tqku-w7fz", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3482", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40755", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48153", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48172", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48232", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48227", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48183", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48165", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48174", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48124", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48177", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48195", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48168", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48179", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3482" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22", "reference_id": "mfsa2023-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-22/", "reference_id": "mfsa2023-22", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-12T20:14:31Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-22/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1839464", "reference_id": "show_bug.cgi?id=1839464", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-12T20:14:31Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1839464" }, { "reference_url": "https://usn.ubuntu.com/6201-1/", "reference_id": "USN-6201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6201-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-3482" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yxag-tqku-w7fz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51436?format=api", "vulnerability_id": "VCID-zhu4-sy56-1yea", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6861.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6861.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.6171", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61704", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61609", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61639", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61658", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61672", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61694", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61663", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61682", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00499", "scoring_system": "epss", "scoring_elements": "0.66006", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00499", "scoring_system": "epss", "scoring_elements": "0.65975", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00499", "scoring_system": "epss", "scoring_elements": "0.65995", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255367", "reference_id": "2255367", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255367" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0001", "reference_id": "RHSA-2024:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0002", "reference_id": "RHSA-2024:0002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0003", "reference_id": "RHSA-2024:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0004", "reference_id": "RHSA-2024:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0005", "reference_id": "RHSA-2024:0005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0011", "reference_id": "RHSA-2024:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0012", "reference_id": "RHSA-2024:0012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0012" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0019", "reference_id": "RHSA-2024:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0021", "reference_id": "RHSA-2024:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0022", "reference_id": "RHSA-2024:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0023", "reference_id": "RHSA-2024:0023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0024", "reference_id": "RHSA-2024:0024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0025", "reference_id": "RHSA-2024:0025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0026", "reference_id": "RHSA-2024:0026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0027", "reference_id": "RHSA-2024:0027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0028", "reference_id": "RHSA-2024:0028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0029", "reference_id": "RHSA-2024:0029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0030", "reference_id": "RHSA-2024:0030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0030" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" }, { "reference_url": "https://usn.ubuntu.com/6563-1/", "reference_id": "USN-6563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6563-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85630?format=api", "purl": "pkg:ebuild/www-client/firefox@115.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/85631?format=api", "purl": "pkg:ebuild/www-client/firefox@121.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" } ], "aliases": [ "CVE-2023-6861" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zhu4-sy56-1yea" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@121.0" }