Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/firefox@115.11.0-1?arch=el8_6
Typerpm
Namespaceredhat
Namefirefox
Version115.11.0-1
Qualifiers
arch el8_6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-11pv-s4za-tbch
vulnerability_id VCID-11pv-s4za-tbch
summary A bug in popup notifications' interaction with WebAuthn made it easier for an attacker to trick a user into granting permissions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4768.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4768.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4768
reference_id
reference_type
scores
0
value 0.00706
scoring_system epss
scoring_elements 0.7223
published_at 2026-04-24T12:55:00Z
1
value 0.00706
scoring_system epss
scoring_elements 0.72187
published_at 2026-04-21T12:55:00Z
2
value 0.00706
scoring_system epss
scoring_elements 0.72113
published_at 2026-04-02T12:55:00Z
3
value 0.00706
scoring_system epss
scoring_elements 0.72181
published_at 2026-04-11T12:55:00Z
4
value 0.00706
scoring_system epss
scoring_elements 0.72159
published_at 2026-04-09T12:55:00Z
5
value 0.00706
scoring_system epss
scoring_elements 0.72147
published_at 2026-04-08T12:55:00Z
6
value 0.00706
scoring_system epss
scoring_elements 0.7211
published_at 2026-04-07T12:55:00Z
7
value 0.00706
scoring_system epss
scoring_elements 0.72133
published_at 2026-04-04T12:55:00Z
8
value 0.00706
scoring_system epss
scoring_elements 0.72202
published_at 2026-04-18T12:55:00Z
9
value 0.00706
scoring_system epss
scoring_elements 0.72193
published_at 2026-04-16T12:55:00Z
10
value 0.00706
scoring_system epss
scoring_elements 0.72152
published_at 2026-04-13T12:55:00Z
11
value 0.00706
scoring_system epss
scoring_elements 0.72166
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4768
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280384
reference_id 2280384
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280384
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
reference_id mfsa2024-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21/
reference_id mfsa2024-21
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:37:43Z/
url https://www.mozilla.org/security/advisories/mfsa2024-21/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
reference_id mfsa2024-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-22/
reference_id mfsa2024-22
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:37:43Z/
url https://www.mozilla.org/security/advisories/mfsa2024-22/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
reference_id mfsa2024-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-23/
reference_id mfsa2024-23
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:37:43Z/
url https://www.mozilla.org/security/advisories/mfsa2024-23/
16
reference_url https://access.redhat.com/errata/RHSA-2024:2881
reference_id RHSA-2024:2881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2881
17
reference_url https://access.redhat.com/errata/RHSA-2024:2882
reference_id RHSA-2024:2882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2882
18
reference_url https://access.redhat.com/errata/RHSA-2024:2883
reference_id RHSA-2024:2883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2883
19
reference_url https://access.redhat.com/errata/RHSA-2024:2884
reference_id RHSA-2024:2884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2884
20
reference_url https://access.redhat.com/errata/RHSA-2024:2885
reference_id RHSA-2024:2885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2885
21
reference_url https://access.redhat.com/errata/RHSA-2024:2886
reference_id RHSA-2024:2886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2886
22
reference_url https://access.redhat.com/errata/RHSA-2024:2887
reference_id RHSA-2024:2887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2887
23
reference_url https://access.redhat.com/errata/RHSA-2024:2888
reference_id RHSA-2024:2888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2888
24
reference_url https://access.redhat.com/errata/RHSA-2024:2903
reference_id RHSA-2024:2903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2903
25
reference_url https://access.redhat.com/errata/RHSA-2024:2904
reference_id RHSA-2024:2904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2904
26
reference_url https://access.redhat.com/errata/RHSA-2024:2905
reference_id RHSA-2024:2905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2905
27
reference_url https://access.redhat.com/errata/RHSA-2024:2906
reference_id RHSA-2024:2906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2906
28
reference_url https://access.redhat.com/errata/RHSA-2024:2911
reference_id RHSA-2024:2911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2911
29
reference_url https://access.redhat.com/errata/RHSA-2024:2912
reference_id RHSA-2024:2912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2912
30
reference_url https://access.redhat.com/errata/RHSA-2024:2913
reference_id RHSA-2024:2913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2913
31
reference_url https://access.redhat.com/errata/RHSA-2024:3338
reference_id RHSA-2024:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3338
32
reference_url https://access.redhat.com/errata/RHSA-2024:3783
reference_id RHSA-2024:3783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3783
33
reference_url https://access.redhat.com/errata/RHSA-2024:3784
reference_id RHSA-2024:3784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3784
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1886082
reference_id show_bug.cgi?id=1886082
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:37:43Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1886082
35
reference_url https://usn.ubuntu.com/6779-1/
reference_id USN-6779-1
reference_type
scores
url https://usn.ubuntu.com/6779-1/
36
reference_url https://usn.ubuntu.com/6782-1/
reference_id USN-6782-1
reference_type
scores
url https://usn.ubuntu.com/6782-1/
fixed_packages
aliases CVE-2024-4768
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-11pv-s4za-tbch
1
url VCID-7zqn-1txc-r3d2
vulnerability_id VCID-7zqn-1txc-r3d2
summary When saving a page to PDF, certain font styles could have led to a potential use-after-free crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4770.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4770.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4770
reference_id
reference_type
scores
0
value 0.00464
scoring_system epss
scoring_elements 0.64387
published_at 2026-04-24T12:55:00Z
1
value 0.00464
scoring_system epss
scoring_elements 0.64368
published_at 2026-04-21T12:55:00Z
2
value 0.00464
scoring_system epss
scoring_elements 0.64376
published_at 2026-04-18T12:55:00Z
3
value 0.00464
scoring_system epss
scoring_elements 0.64365
published_at 2026-04-16T12:55:00Z
4
value 0.00464
scoring_system epss
scoring_elements 0.64308
published_at 2026-04-02T12:55:00Z
5
value 0.00464
scoring_system epss
scoring_elements 0.64342
published_at 2026-04-08T12:55:00Z
6
value 0.00464
scoring_system epss
scoring_elements 0.64294
published_at 2026-04-07T12:55:00Z
7
value 0.00464
scoring_system epss
scoring_elements 0.64336
published_at 2026-04-04T12:55:00Z
8
value 0.00464
scoring_system epss
scoring_elements 0.64329
published_at 2026-04-13T12:55:00Z
9
value 0.00464
scoring_system epss
scoring_elements 0.64358
published_at 2026-04-12T12:55:00Z
10
value 0.00464
scoring_system epss
scoring_elements 0.64369
published_at 2026-04-11T12:55:00Z
11
value 0.00464
scoring_system epss
scoring_elements 0.64357
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4770
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280386
reference_id 2280386
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280386
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
reference_id mfsa2024-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21/
reference_id mfsa2024-21
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:03:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-21/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
reference_id mfsa2024-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-22/
reference_id mfsa2024-22
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:03:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-22/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
reference_id mfsa2024-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-23/
reference_id mfsa2024-23
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:03:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-23/
16
reference_url https://access.redhat.com/errata/RHSA-2024:2881
reference_id RHSA-2024:2881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2881
17
reference_url https://access.redhat.com/errata/RHSA-2024:2882
reference_id RHSA-2024:2882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2882
18
reference_url https://access.redhat.com/errata/RHSA-2024:2883
reference_id RHSA-2024:2883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2883
19
reference_url https://access.redhat.com/errata/RHSA-2024:2884
reference_id RHSA-2024:2884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2884
20
reference_url https://access.redhat.com/errata/RHSA-2024:2885
reference_id RHSA-2024:2885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2885
21
reference_url https://access.redhat.com/errata/RHSA-2024:2886
reference_id RHSA-2024:2886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2886
22
reference_url https://access.redhat.com/errata/RHSA-2024:2887
reference_id RHSA-2024:2887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2887
23
reference_url https://access.redhat.com/errata/RHSA-2024:2888
reference_id RHSA-2024:2888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2888
24
reference_url https://access.redhat.com/errata/RHSA-2024:2903
reference_id RHSA-2024:2903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2903
25
reference_url https://access.redhat.com/errata/RHSA-2024:2904
reference_id RHSA-2024:2904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2904
26
reference_url https://access.redhat.com/errata/RHSA-2024:2905
reference_id RHSA-2024:2905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2905
27
reference_url https://access.redhat.com/errata/RHSA-2024:2906
reference_id RHSA-2024:2906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2906
28
reference_url https://access.redhat.com/errata/RHSA-2024:2911
reference_id RHSA-2024:2911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2911
29
reference_url https://access.redhat.com/errata/RHSA-2024:2912
reference_id RHSA-2024:2912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2912
30
reference_url https://access.redhat.com/errata/RHSA-2024:2913
reference_id RHSA-2024:2913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2913
31
reference_url https://access.redhat.com/errata/RHSA-2024:3338
reference_id RHSA-2024:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3338
32
reference_url https://access.redhat.com/errata/RHSA-2024:3783
reference_id RHSA-2024:3783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3783
33
reference_url https://access.redhat.com/errata/RHSA-2024:3784
reference_id RHSA-2024:3784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3784
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1893270
reference_id show_bug.cgi?id=1893270
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:03:13Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1893270
35
reference_url https://usn.ubuntu.com/6779-1/
reference_id USN-6779-1
reference_type
scores
url https://usn.ubuntu.com/6779-1/
36
reference_url https://usn.ubuntu.com/6782-1/
reference_id USN-6782-1
reference_type
scores
url https://usn.ubuntu.com/6782-1/
fixed_packages
aliases CVE-2024-4770
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7zqn-1txc-r3d2
2
url VCID-89es-k3ja-1be1
vulnerability_id VCID-89es-k3ja-1be1
summary
PDF.js vulnerable to arbitrary JavaScript execution upon opening a malicious PDF
### Impact
If pdf.js is used to load a malicious PDF, and PDF.js is configured with `isEvalSupported` set to `true` (which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain.

### Patches
The patch removes the use of `eval`:
https://github.com/mozilla/pdf.js/pull/18015

### Workarounds
Set the option `isEvalSupported` to `false`. 

### References
https://bugzilla.mozilla.org/show_bug.cgi?id=1893645
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4367.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4367.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4367
reference_id
reference_type
scores
0
value 0.34613
scoring_system epss
scoring_elements 0.9702
published_at 2026-04-24T12:55:00Z
1
value 0.34613
scoring_system epss
scoring_elements 0.97016
published_at 2026-04-18T12:55:00Z
2
value 0.34613
scoring_system epss
scoring_elements 0.97012
published_at 2026-04-16T12:55:00Z
3
value 0.34613
scoring_system epss
scoring_elements 0.97003
published_at 2026-04-13T12:55:00Z
4
value 0.34613
scoring_system epss
scoring_elements 0.97001
published_at 2026-04-11T12:55:00Z
5
value 0.34613
scoring_system epss
scoring_elements 0.96999
published_at 2026-04-09T12:55:00Z
6
value 0.34613
scoring_system epss
scoring_elements 0.96998
published_at 2026-04-08T12:55:00Z
7
value 0.34613
scoring_system epss
scoring_elements 0.9699
published_at 2026-04-07T12:55:00Z
8
value 0.34613
scoring_system epss
scoring_elements 0.96988
published_at 2026-04-04T12:55:00Z
9
value 0.34613
scoring_system epss
scoring_elements 0.96984
published_at 2026-04-02T12:55:00Z
10
value 0.35178
scoring_system epss
scoring_elements 0.97051
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4367
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1893645
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-26T04:55:26Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1893645
3
reference_url https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
10
reference_url http://seclists.org/fulldisclosure/2024/Aug/30
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2024/Aug/30
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://github.com/gogs/gogs/issues/7928
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/gogs/gogs/issues/7928
13
reference_url https://github.com/mozilla/pdf.js
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mozilla/pdf.js
14
reference_url https://github.com/mozilla/pdf.js/commit/85e64b5c16c9aaef738f421733c12911a441cec6
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mozilla/pdf.js/commit/85e64b5c16c9aaef738f421733c12911a441cec6
15
reference_url https://github.com/mozilla/pdf.js/pull/18015
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mozilla/pdf.js/pull/18015
16
reference_url https://github.com/mozilla/pdf.js/releases/tag/v4.2.67
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mozilla/pdf.js/releases/tag/v4.2.67
17
reference_url https://github.com/mozilla/pdf.js/security/advisories/GHSA-wgrm-67xf-hhpq
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mozilla/pdf.js/security/advisories/GHSA-wgrm-67xf-hhpq
18
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00010.html
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-26T04:55:26Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00010.html
19
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00012.html
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-26T04:55:26Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00012.html
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-4367
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-4367
21
reference_url https://www.exploit-db.com/exploits/52273
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.exploit-db.com/exploits/52273
22
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/security/advisories/mfsa2024-21
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-22
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/security/advisories/mfsa2024-22
24
reference_url https://www.mozilla.org/security/advisories/mfsa2024-23
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/security/advisories/mfsa2024-23
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074228
reference_id 1074228
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074228
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280382
reference_id 2280382
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280382
27
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/52273.py
reference_id CVE-2024-4367
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/52273.py
28
reference_url https://github.com/advisories/GHSA-wgrm-67xf-hhpq
reference_id GHSA-wgrm-67xf-hhpq
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-wgrm-67xf-hhpq
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
reference_id mfsa2024-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
30
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21/
reference_id mfsa2024-21
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-26T04:55:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-21/
31
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
reference_id mfsa2024-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
32
reference_url https://www.mozilla.org/security/advisories/mfsa2024-22/
reference_id mfsa2024-22
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-26T04:55:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-22/
33
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
reference_id mfsa2024-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
34
reference_url https://www.mozilla.org/security/advisories/mfsa2024-23/
reference_id mfsa2024-23
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-26T04:55:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-23/
35
reference_url https://access.redhat.com/errata/RHSA-2024:2881
reference_id RHSA-2024:2881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2881
36
reference_url https://access.redhat.com/errata/RHSA-2024:2882
reference_id RHSA-2024:2882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2882
37
reference_url https://access.redhat.com/errata/RHSA-2024:2883
reference_id RHSA-2024:2883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2883
38
reference_url https://access.redhat.com/errata/RHSA-2024:2884
reference_id RHSA-2024:2884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2884
39
reference_url https://access.redhat.com/errata/RHSA-2024:2885
reference_id RHSA-2024:2885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2885
40
reference_url https://access.redhat.com/errata/RHSA-2024:2886
reference_id RHSA-2024:2886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2886
41
reference_url https://access.redhat.com/errata/RHSA-2024:2887
reference_id RHSA-2024:2887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2887
42
reference_url https://access.redhat.com/errata/RHSA-2024:2888
reference_id RHSA-2024:2888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2888
43
reference_url https://access.redhat.com/errata/RHSA-2024:2903
reference_id RHSA-2024:2903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2903
44
reference_url https://access.redhat.com/errata/RHSA-2024:2904
reference_id RHSA-2024:2904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2904
45
reference_url https://access.redhat.com/errata/RHSA-2024:2905
reference_id RHSA-2024:2905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2905
46
reference_url https://access.redhat.com/errata/RHSA-2024:2906
reference_id RHSA-2024:2906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2906
47
reference_url https://access.redhat.com/errata/RHSA-2024:2911
reference_id RHSA-2024:2911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2911
48
reference_url https://access.redhat.com/errata/RHSA-2024:2912
reference_id RHSA-2024:2912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2912
49
reference_url https://access.redhat.com/errata/RHSA-2024:2913
reference_id RHSA-2024:2913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2913
50
reference_url https://access.redhat.com/errata/RHSA-2024:3338
reference_id RHSA-2024:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3338
51
reference_url https://access.redhat.com/errata/RHSA-2024:3783
reference_id RHSA-2024:3783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3783
52
reference_url https://access.redhat.com/errata/RHSA-2024:3784
reference_id RHSA-2024:3784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3784
53
reference_url https://usn.ubuntu.com/6779-1/
reference_id USN-6779-1
reference_type
scores
url https://usn.ubuntu.com/6779-1/
54
reference_url https://usn.ubuntu.com/6782-1/
reference_id USN-6782-1
reference_type
scores
url https://usn.ubuntu.com/6782-1/
fixed_packages
aliases CVE-2024-4367, GHSA-wgrm-67xf-hhpq
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-89es-k3ja-1be1
3
url VCID-b3zg-y242-xybq
vulnerability_id VCID-b3zg-y242-xybq
summary If the browser.privatebrowsing.autostart preference is enabled, IndexedDB files were not properly deleted when the window was closed. This preference is disabled by default in Firefox.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4767.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4767.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4767
reference_id
reference_type
scores
0
value 0.00872
scoring_system epss
scoring_elements 0.75289
published_at 2026-04-24T12:55:00Z
1
value 0.00872
scoring_system epss
scoring_elements 0.75253
published_at 2026-04-21T12:55:00Z
2
value 0.00872
scoring_system epss
scoring_elements 0.75176
published_at 2026-04-02T12:55:00Z
3
value 0.00872
scoring_system epss
scoring_elements 0.75251
published_at 2026-04-11T12:55:00Z
4
value 0.00872
scoring_system epss
scoring_elements 0.7523
published_at 2026-04-09T12:55:00Z
5
value 0.00872
scoring_system epss
scoring_elements 0.75218
published_at 2026-04-08T12:55:00Z
6
value 0.00872
scoring_system epss
scoring_elements 0.75184
published_at 2026-04-07T12:55:00Z
7
value 0.00872
scoring_system epss
scoring_elements 0.75207
published_at 2026-04-04T12:55:00Z
8
value 0.00872
scoring_system epss
scoring_elements 0.75262
published_at 2026-04-18T12:55:00Z
9
value 0.00872
scoring_system epss
scoring_elements 0.75256
published_at 2026-04-16T12:55:00Z
10
value 0.00872
scoring_system epss
scoring_elements 0.75217
published_at 2026-04-13T12:55:00Z
11
value 0.00872
scoring_system epss
scoring_elements 0.75229
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4767
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280383
reference_id 2280383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280383
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
reference_id mfsa2024-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21/
reference_id mfsa2024-21
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T14:46:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-21/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
reference_id mfsa2024-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-22/
reference_id mfsa2024-22
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T14:46:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-22/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
reference_id mfsa2024-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-23/
reference_id mfsa2024-23
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T14:46:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-23/
16
reference_url https://access.redhat.com/errata/RHSA-2024:2881
reference_id RHSA-2024:2881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2881
17
reference_url https://access.redhat.com/errata/RHSA-2024:2882
reference_id RHSA-2024:2882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2882
18
reference_url https://access.redhat.com/errata/RHSA-2024:2883
reference_id RHSA-2024:2883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2883
19
reference_url https://access.redhat.com/errata/RHSA-2024:2884
reference_id RHSA-2024:2884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2884
20
reference_url https://access.redhat.com/errata/RHSA-2024:2885
reference_id RHSA-2024:2885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2885
21
reference_url https://access.redhat.com/errata/RHSA-2024:2886
reference_id RHSA-2024:2886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2886
22
reference_url https://access.redhat.com/errata/RHSA-2024:2887
reference_id RHSA-2024:2887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2887
23
reference_url https://access.redhat.com/errata/RHSA-2024:2888
reference_id RHSA-2024:2888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2888
24
reference_url https://access.redhat.com/errata/RHSA-2024:2903
reference_id RHSA-2024:2903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2903
25
reference_url https://access.redhat.com/errata/RHSA-2024:2904
reference_id RHSA-2024:2904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2904
26
reference_url https://access.redhat.com/errata/RHSA-2024:2905
reference_id RHSA-2024:2905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2905
27
reference_url https://access.redhat.com/errata/RHSA-2024:2906
reference_id RHSA-2024:2906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2906
28
reference_url https://access.redhat.com/errata/RHSA-2024:2911
reference_id RHSA-2024:2911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2911
29
reference_url https://access.redhat.com/errata/RHSA-2024:2912
reference_id RHSA-2024:2912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2912
30
reference_url https://access.redhat.com/errata/RHSA-2024:2913
reference_id RHSA-2024:2913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2913
31
reference_url https://access.redhat.com/errata/RHSA-2024:3338
reference_id RHSA-2024:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3338
32
reference_url https://access.redhat.com/errata/RHSA-2024:3783
reference_id RHSA-2024:3783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3783
33
reference_url https://access.redhat.com/errata/RHSA-2024:3784
reference_id RHSA-2024:3784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3784
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1878577
reference_id show_bug.cgi?id=1878577
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T14:46:26Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1878577
35
reference_url https://usn.ubuntu.com/6779-1/
reference_id USN-6779-1
reference_type
scores
url https://usn.ubuntu.com/6779-1/
36
reference_url https://usn.ubuntu.com/6782-1/
reference_id USN-6782-1
reference_type
scores
url https://usn.ubuntu.com/6782-1/
fixed_packages
aliases CVE-2024-4767
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b3zg-y242-xybq
4
url VCID-esw4-827s-u3f1
vulnerability_id VCID-esw4-827s-u3f1
summary When importing resources using Web Workers, error messages would distinguish the difference between application/javascript responses and non-script responses. This could have been abused to learn information cross-origin.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4769.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4769.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4769
reference_id
reference_type
scores
0
value 0.00693
scoring_system epss
scoring_elements 0.71915
published_at 2026-04-24T12:55:00Z
1
value 0.00693
scoring_system epss
scoring_elements 0.7187
published_at 2026-04-21T12:55:00Z
2
value 0.0083
scoring_system epss
scoring_elements 0.74488
published_at 2026-04-02T12:55:00Z
3
value 0.0083
scoring_system epss
scoring_elements 0.74558
published_at 2026-04-11T12:55:00Z
4
value 0.0083
scoring_system epss
scoring_elements 0.74536
published_at 2026-04-09T12:55:00Z
5
value 0.0083
scoring_system epss
scoring_elements 0.74521
published_at 2026-04-08T12:55:00Z
6
value 0.0083
scoring_system epss
scoring_elements 0.74489
published_at 2026-04-07T12:55:00Z
7
value 0.0083
scoring_system epss
scoring_elements 0.74514
published_at 2026-04-04T12:55:00Z
8
value 0.0083
scoring_system epss
scoring_elements 0.74576
published_at 2026-04-18T12:55:00Z
9
value 0.0083
scoring_system epss
scoring_elements 0.74569
published_at 2026-04-16T12:55:00Z
10
value 0.0083
scoring_system epss
scoring_elements 0.74531
published_at 2026-04-13T12:55:00Z
11
value 0.0083
scoring_system epss
scoring_elements 0.74539
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4769
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280385
reference_id 2280385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280385
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
reference_id mfsa2024-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21/
reference_id mfsa2024-21
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-15T15:22:42Z/
url https://www.mozilla.org/security/advisories/mfsa2024-21/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
reference_id mfsa2024-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-22/
reference_id mfsa2024-22
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-15T15:22:42Z/
url https://www.mozilla.org/security/advisories/mfsa2024-22/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
reference_id mfsa2024-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-23/
reference_id mfsa2024-23
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-15T15:22:42Z/
url https://www.mozilla.org/security/advisories/mfsa2024-23/
16
reference_url https://access.redhat.com/errata/RHSA-2024:2881
reference_id RHSA-2024:2881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2881
17
reference_url https://access.redhat.com/errata/RHSA-2024:2882
reference_id RHSA-2024:2882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2882
18
reference_url https://access.redhat.com/errata/RHSA-2024:2883
reference_id RHSA-2024:2883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2883
19
reference_url https://access.redhat.com/errata/RHSA-2024:2884
reference_id RHSA-2024:2884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2884
20
reference_url https://access.redhat.com/errata/RHSA-2024:2885
reference_id RHSA-2024:2885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2885
21
reference_url https://access.redhat.com/errata/RHSA-2024:2886
reference_id RHSA-2024:2886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2886
22
reference_url https://access.redhat.com/errata/RHSA-2024:2887
reference_id RHSA-2024:2887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2887
23
reference_url https://access.redhat.com/errata/RHSA-2024:2888
reference_id RHSA-2024:2888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2888
24
reference_url https://access.redhat.com/errata/RHSA-2024:2903
reference_id RHSA-2024:2903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2903
25
reference_url https://access.redhat.com/errata/RHSA-2024:2904
reference_id RHSA-2024:2904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2904
26
reference_url https://access.redhat.com/errata/RHSA-2024:2905
reference_id RHSA-2024:2905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2905
27
reference_url https://access.redhat.com/errata/RHSA-2024:2906
reference_id RHSA-2024:2906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2906
28
reference_url https://access.redhat.com/errata/RHSA-2024:2911
reference_id RHSA-2024:2911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2911
29
reference_url https://access.redhat.com/errata/RHSA-2024:2912
reference_id RHSA-2024:2912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2912
30
reference_url https://access.redhat.com/errata/RHSA-2024:2913
reference_id RHSA-2024:2913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2913
31
reference_url https://access.redhat.com/errata/RHSA-2024:3338
reference_id RHSA-2024:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3338
32
reference_url https://access.redhat.com/errata/RHSA-2024:3783
reference_id RHSA-2024:3783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3783
33
reference_url https://access.redhat.com/errata/RHSA-2024:3784
reference_id RHSA-2024:3784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3784
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1886108
reference_id show_bug.cgi?id=1886108
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-15T15:22:42Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1886108
35
reference_url https://usn.ubuntu.com/6779-1/
reference_id USN-6779-1
reference_type
scores
url https://usn.ubuntu.com/6779-1/
36
reference_url https://usn.ubuntu.com/6782-1/
reference_id USN-6782-1
reference_type
scores
url https://usn.ubuntu.com/6782-1/
fixed_packages
aliases CVE-2024-4769
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-esw4-827s-u3f1
5
url VCID-yb18-qe5e-dbck
vulnerability_id VCID-yb18-qe5e-dbck
summary Memory safety bugs present in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4777.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4777.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4777
reference_id
reference_type
scores
0
value 0.00656
scoring_system epss
scoring_elements 0.71089
published_at 2026-04-24T12:55:00Z
1
value 0.00656
scoring_system epss
scoring_elements 0.71034
published_at 2026-04-21T12:55:00Z
2
value 0.00656
scoring_system epss
scoring_elements 0.70961
published_at 2026-04-02T12:55:00Z
3
value 0.00656
scoring_system epss
scoring_elements 0.71033
published_at 2026-04-11T12:55:00Z
4
value 0.00656
scoring_system epss
scoring_elements 0.71011
published_at 2026-04-09T12:55:00Z
5
value 0.00656
scoring_system epss
scoring_elements 0.70996
published_at 2026-04-08T12:55:00Z
6
value 0.00656
scoring_system epss
scoring_elements 0.70954
published_at 2026-04-07T12:55:00Z
7
value 0.00656
scoring_system epss
scoring_elements 0.70979
published_at 2026-04-04T12:55:00Z
8
value 0.00656
scoring_system epss
scoring_elements 0.71054
published_at 2026-04-18T12:55:00Z
9
value 0.00656
scoring_system epss
scoring_elements 0.71047
published_at 2026-04-16T12:55:00Z
10
value 0.00656
scoring_system epss
scoring_elements 0.71001
published_at 2026-04-13T12:55:00Z
11
value 0.00656
scoring_system epss
scoring_elements 0.71018
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4777
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280387
reference_id 2280387
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280387
10
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1878199%2C1893340
reference_id buglist.cgi?bug_id=1878199%2C1893340
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:05:30Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1878199%2C1893340
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
reference_id mfsa2024-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-21
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-21/
reference_id mfsa2024-21
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:05:30Z/
url https://www.mozilla.org/security/advisories/mfsa2024-21/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
reference_id mfsa2024-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-22
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-22/
reference_id mfsa2024-22
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:05:30Z/
url https://www.mozilla.org/security/advisories/mfsa2024-22/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
reference_id mfsa2024-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-23
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-23/
reference_id mfsa2024-23
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:05:30Z/
url https://www.mozilla.org/security/advisories/mfsa2024-23/
17
reference_url https://access.redhat.com/errata/RHSA-2024:2881
reference_id RHSA-2024:2881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2881
18
reference_url https://access.redhat.com/errata/RHSA-2024:2882
reference_id RHSA-2024:2882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2882
19
reference_url https://access.redhat.com/errata/RHSA-2024:2883
reference_id RHSA-2024:2883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2883
20
reference_url https://access.redhat.com/errata/RHSA-2024:2884
reference_id RHSA-2024:2884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2884
21
reference_url https://access.redhat.com/errata/RHSA-2024:2885
reference_id RHSA-2024:2885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2885
22
reference_url https://access.redhat.com/errata/RHSA-2024:2886
reference_id RHSA-2024:2886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2886
23
reference_url https://access.redhat.com/errata/RHSA-2024:2887
reference_id RHSA-2024:2887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2887
24
reference_url https://access.redhat.com/errata/RHSA-2024:2888
reference_id RHSA-2024:2888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2888
25
reference_url https://access.redhat.com/errata/RHSA-2024:2903
reference_id RHSA-2024:2903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2903
26
reference_url https://access.redhat.com/errata/RHSA-2024:2904
reference_id RHSA-2024:2904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2904
27
reference_url https://access.redhat.com/errata/RHSA-2024:2905
reference_id RHSA-2024:2905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2905
28
reference_url https://access.redhat.com/errata/RHSA-2024:2906
reference_id RHSA-2024:2906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2906
29
reference_url https://access.redhat.com/errata/RHSA-2024:2911
reference_id RHSA-2024:2911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2911
30
reference_url https://access.redhat.com/errata/RHSA-2024:2912
reference_id RHSA-2024:2912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2912
31
reference_url https://access.redhat.com/errata/RHSA-2024:2913
reference_id RHSA-2024:2913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2913
32
reference_url https://access.redhat.com/errata/RHSA-2024:3338
reference_id RHSA-2024:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3338
33
reference_url https://access.redhat.com/errata/RHSA-2024:3783
reference_id RHSA-2024:3783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3783
34
reference_url https://access.redhat.com/errata/RHSA-2024:3784
reference_id RHSA-2024:3784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3784
35
reference_url https://usn.ubuntu.com/6779-1/
reference_id USN-6779-1
reference_type
scores
url https://usn.ubuntu.com/6779-1/
36
reference_url https://usn.ubuntu.com/6782-1/
reference_id USN-6782-1
reference_type
scores
url https://usn.ubuntu.com/6782-1/
fixed_packages
aliases CVE-2024-4777
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yb18-qe5e-dbck
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@115.11.0-1%3Farch=el8_6