Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
Typedeb
Namespacedebian
Namenss
Version2:3.26.2-1.1+deb9u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2:3.87.1-1+deb12u2
Latest_non_vulnerable_version2:3.87.1-1+deb12u2
Affected_by_vulnerabilities
0
url VCID-2zrv-q4tb-wqeg
vulnerability_id VCID-2zrv-q4tb-wqeg
summary
The NSS code used for checking PKCS#1 v1.5 was leaking information useful in mounting Bleichenbacher-like attacks.
Both the overall correctness of the padding as well as the length of the encrypted message was leaking through timing side-channel.
By sending large number of attacker-selected ciphertexts, the attacker would be able to decrypt a previously intercepted PKCS#1 v1.5 ciphertext (for example, to decrypt a TLS session that used RSA key exchange), or forge a signature using the victim's key.
The issue was fixed by implementing the implicit rejection algorithm, in which the NSS returns a deterministic random message in case invalid padding is detected, as proposed in the Marvin Attack paper.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4421.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4421.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4421
reference_id
reference_type
scores
0
value 0.00224
scoring_system epss
scoring_elements 0.4514
published_at 2026-04-13T12:55:00Z
1
value 0.00224
scoring_system epss
scoring_elements 0.45171
published_at 2026-04-11T12:55:00Z
2
value 0.00224
scoring_system epss
scoring_elements 0.45138
published_at 2026-04-12T12:55:00Z
3
value 0.00224
scoring_system epss
scoring_elements 0.45132
published_at 2026-04-02T12:55:00Z
4
value 0.00224
scoring_system epss
scoring_elements 0.45154
published_at 2026-04-04T12:55:00Z
5
value 0.00224
scoring_system epss
scoring_elements 0.45096
published_at 2026-04-07T12:55:00Z
6
value 0.00224
scoring_system epss
scoring_elements 0.45149
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4421
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4421
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238677
reference_id 2238677
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2238677
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-53
reference_id mfsa2023-53
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-53
6
reference_url https://usn.ubuntu.com/6727-1/
reference_id USN-6727-1
reference_type
scores
url https://usn.ubuntu.com/6727-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2023-4421
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2zrv-q4tb-wqeg
1
url VCID-46cy-x3cp-tke5
vulnerability_id VCID-46cy-x3cp-tke5
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0743.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0743.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0743
reference_id
reference_type
scores
0
value 0.00926
scoring_system epss
scoring_elements 0.76033
published_at 2026-04-13T12:55:00Z
1
value 0.00926
scoring_system epss
scoring_elements 0.75979
published_at 2026-04-02T12:55:00Z
2
value 0.00926
scoring_system epss
scoring_elements 0.76039
published_at 2026-04-12T12:55:00Z
3
value 0.00926
scoring_system epss
scoring_elements 0.76062
published_at 2026-04-11T12:55:00Z
4
value 0.00926
scoring_system epss
scoring_elements 0.76037
published_at 2026-04-09T12:55:00Z
5
value 0.00926
scoring_system epss
scoring_elements 0.76023
published_at 2026-04-08T12:55:00Z
6
value 0.00926
scoring_system epss
scoring_elements 0.7599
published_at 2026-04-07T12:55:00Z
7
value 0.00926
scoring_system epss
scoring_elements 0.76011
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0743
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2260012
reference_id 2260012
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2260012
14
reference_url https://security.gentoo.org/glsa/202402-26
reference_id GLSA-202402-26
reference_type
scores
url https://security.gentoo.org/glsa/202402-26
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
reference_id mfsa2024-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-01/
reference_id mfsa2024-01
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://www.mozilla.org/security/advisories/mfsa2024-01/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
reference_id mfsa2024-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-13
18
reference_url https://www.mozilla.org/security/advisories/mfsa2024-13/
reference_id mfsa2024-13
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://www.mozilla.org/security/advisories/mfsa2024-13/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
reference_id mfsa2024-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-14
20
reference_url https://www.mozilla.org/security/advisories/mfsa2024-14/
reference_id mfsa2024-14
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://www.mozilla.org/security/advisories/mfsa2024-14/
21
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00010.html
22
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
23
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
24
reference_url https://access.redhat.com/errata/RHSA-2024:1483
reference_id RHSA-2024:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1483
25
reference_url https://access.redhat.com/errata/RHSA-2024:1484
reference_id RHSA-2024:1484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1484
26
reference_url https://access.redhat.com/errata/RHSA-2024:1485
reference_id RHSA-2024:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1485
27
reference_url https://access.redhat.com/errata/RHSA-2024:1486
reference_id RHSA-2024:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1486
28
reference_url https://access.redhat.com/errata/RHSA-2024:1487
reference_id RHSA-2024:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1487
29
reference_url https://access.redhat.com/errata/RHSA-2024:1488
reference_id RHSA-2024:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1488
30
reference_url https://access.redhat.com/errata/RHSA-2024:1489
reference_id RHSA-2024:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1489
31
reference_url https://access.redhat.com/errata/RHSA-2024:1490
reference_id RHSA-2024:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1490
32
reference_url https://access.redhat.com/errata/RHSA-2024:1491
reference_id RHSA-2024:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1491
33
reference_url https://access.redhat.com/errata/RHSA-2024:1492
reference_id RHSA-2024:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1492
34
reference_url https://access.redhat.com/errata/RHSA-2024:1493
reference_id RHSA-2024:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1493
35
reference_url https://access.redhat.com/errata/RHSA-2024:1494
reference_id RHSA-2024:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1494
36
reference_url https://access.redhat.com/errata/RHSA-2024:1495
reference_id RHSA-2024:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1495
37
reference_url https://access.redhat.com/errata/RHSA-2024:1496
reference_id RHSA-2024:1496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1496
38
reference_url https://access.redhat.com/errata/RHSA-2024:1497
reference_id RHSA-2024:1497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1497
39
reference_url https://access.redhat.com/errata/RHSA-2024:1498
reference_id RHSA-2024:1498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1498
40
reference_url https://access.redhat.com/errata/RHSA-2024:1499
reference_id RHSA-2024:1499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1499
41
reference_url https://access.redhat.com/errata/RHSA-2024:1500
reference_id RHSA-2024:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1500
42
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1867408
reference_id show_bug.cgi?id=1867408
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1867408
43
reference_url https://usn.ubuntu.com/6610-1/
reference_id USN-6610-1
reference_type
scores
url https://usn.ubuntu.com/6610-1/
44
reference_url https://usn.ubuntu.com/6717-1/
reference_id USN-6717-1
reference_type
scores
url https://usn.ubuntu.com/6717-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-gret-hn3p-5kbk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1
aliases CVE-2024-0743
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-46cy-x3cp-tke5
2
url VCID-6fvj-phnx-kfgs
vulnerability_id VCID-6fvj-phnx-kfgs
summary After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17023.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17023.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17023
reference_id
reference_type
scores
0
value 0.00899
scoring_system epss
scoring_elements 0.75599
published_at 2026-04-01T12:55:00Z
1
value 0.00899
scoring_system epss
scoring_elements 0.75663
published_at 2026-04-12T12:55:00Z
2
value 0.00899
scoring_system epss
scoring_elements 0.75657
published_at 2026-04-13T12:55:00Z
3
value 0.00899
scoring_system epss
scoring_elements 0.75682
published_at 2026-04-11T12:55:00Z
4
value 0.00899
scoring_system epss
scoring_elements 0.75601
published_at 2026-04-02T12:55:00Z
5
value 0.00899
scoring_system epss
scoring_elements 0.75632
published_at 2026-04-04T12:55:00Z
6
value 0.00899
scoring_system epss
scoring_elements 0.75612
published_at 2026-04-07T12:55:00Z
7
value 0.00899
scoring_system epss
scoring_elements 0.75646
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17023
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1791225
reference_id 1791225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1791225
7
reference_url https://security.archlinux.org/ASA-202001-1
reference_id ASA-202001-1
reference_type
scores
url https://security.archlinux.org/ASA-202001-1
8
reference_url https://security.archlinux.org/AVG-1084
reference_id AVG-1084
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1084
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-01
reference_id mfsa2020-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-01
10
reference_url https://access.redhat.com/errata/RHSA-2020:3280
reference_id RHSA-2020:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3280
11
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
12
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
13
reference_url https://usn.ubuntu.com/4234-1/
reference_id USN-4234-1
reference_type
scores
url https://usn.ubuntu.com/4234-1/
14
reference_url https://usn.ubuntu.com/4397-1/
reference_id USN-4397-1
reference_type
scores
url https://usn.ubuntu.com/4397-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2019-17023
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fvj-phnx-kfgs
3
url VCID-7msj-wyd6-zkbe
vulnerability_id VCID-7msj-wyd6-zkbe
summary nss: Check length of inputs for cryptographic primitives
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17006.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17006.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17006
reference_id
reference_type
scores
0
value 0.03036
scoring_system epss
scoring_elements 0.86605
published_at 2026-04-01T12:55:00Z
1
value 0.03036
scoring_system epss
scoring_elements 0.86617
published_at 2026-04-02T12:55:00Z
2
value 0.03036
scoring_system epss
scoring_elements 0.86636
published_at 2026-04-04T12:55:00Z
3
value 0.03036
scoring_system epss
scoring_elements 0.86635
published_at 2026-04-07T12:55:00Z
4
value 0.03036
scoring_system epss
scoring_elements 0.86654
published_at 2026-04-08T12:55:00Z
5
value 0.03036
scoring_system epss
scoring_elements 0.86664
published_at 2026-04-09T12:55:00Z
6
value 0.03036
scoring_system epss
scoring_elements 0.86677
published_at 2026-04-11T12:55:00Z
7
value 0.03036
scoring_system epss
scoring_elements 0.86675
published_at 2026-04-12T12:55:00Z
8
value 0.03036
scoring_system epss
scoring_elements 0.86668
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17006
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1775916
reference_id 1775916
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1775916
8
reference_url https://access.redhat.com/errata/RHSA-2020:3280
reference_id RHSA-2020:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3280
9
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
10
reference_url https://access.redhat.com/errata/RHSA-2021:0758
reference_id RHSA-2021:0758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0758
11
reference_url https://access.redhat.com/errata/RHSA-2021:0876
reference_id RHSA-2021:0876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0876
12
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
13
reference_url https://access.redhat.com/errata/RHSA-2021:1026
reference_id RHSA-2021:1026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1026
14
reference_url https://usn.ubuntu.com/4231-1/
reference_id USN-4231-1
reference_type
scores
url https://usn.ubuntu.com/4231-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2019-17006
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7msj-wyd6-zkbe
4
url VCID-8qtg-h4km-bfg2
vulnerability_id VCID-8qtg-h4km-bfg2
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11719.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11719.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11719
reference_id
reference_type
scores
0
value 0.00447
scoring_system epss
scoring_elements 0.6355
published_at 2026-04-11T12:55:00Z
1
value 0.00447
scoring_system epss
scoring_elements 0.63534
published_at 2026-04-12T12:55:00Z
2
value 0.00447
scoring_system epss
scoring_elements 0.63517
published_at 2026-04-08T12:55:00Z
3
value 0.00447
scoring_system epss
scoring_elements 0.63413
published_at 2026-04-01T12:55:00Z
4
value 0.00447
scoring_system epss
scoring_elements 0.63465
published_at 2026-04-07T12:55:00Z
5
value 0.00447
scoring_system epss
scoring_elements 0.63473
published_at 2026-04-02T12:55:00Z
6
value 0.00447
scoring_system epss
scoring_elements 0.635
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11719
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1728436
reference_id 1728436
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1728436
5
reference_url https://security.archlinux.org/ASA-201907-4
reference_id ASA-201907-4
reference_type
scores
url https://security.archlinux.org/ASA-201907-4
6
reference_url https://security.archlinux.org/AVG-1002
reference_id AVG-1002
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1002
7
reference_url https://security.gentoo.org/glsa/201908-12
reference_id GLSA-201908-12
reference_type
scores
url https://security.gentoo.org/glsa/201908-12
8
reference_url https://security.gentoo.org/glsa/201908-20
reference_id GLSA-201908-20
reference_type
scores
url https://security.gentoo.org/glsa/201908-20
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-21
reference_id mfsa2019-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-21
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-22
reference_id mfsa2019-22
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-22
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-23
reference_id mfsa2019-23
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-23
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-28
reference_id mfsa2019-28
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-28
13
reference_url https://access.redhat.com/errata/RHSA-2019:1951
reference_id RHSA-2019:1951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1951
14
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
15
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
16
reference_url https://usn.ubuntu.com/4054-1/
reference_id USN-4054-1
reference_type
scores
url https://usn.ubuntu.com/4054-1/
17
reference_url https://usn.ubuntu.com/4060-1/
reference_id USN-4060-1
reference_type
scores
url https://usn.ubuntu.com/4060-1/
18
reference_url https://usn.ubuntu.com/4060-2/
reference_id USN-4060-2
reference_type
scores
url https://usn.ubuntu.com/4060-2/
19
reference_url https://usn.ubuntu.com/4064-1/
reference_id USN-4064-1
reference_type
scores
url https://usn.ubuntu.com/4064-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2019-11719
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8qtg-h4km-bfg2
5
url VCID-cgvg-aj53-kkbp
vulnerability_id VCID-cgvg-aj53-kkbp
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0767.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0767.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0767
reference_id
reference_type
scores
0
value 0.0027
scoring_system epss
scoring_elements 0.50523
published_at 2026-04-11T12:55:00Z
1
value 0.0027
scoring_system epss
scoring_elements 0.505
published_at 2026-04-12T12:55:00Z
2
value 0.0027
scoring_system epss
scoring_elements 0.50477
published_at 2026-04-04T12:55:00Z
3
value 0.0027
scoring_system epss
scoring_elements 0.50481
published_at 2026-04-09T12:55:00Z
4
value 0.0027
scoring_system epss
scoring_elements 0.50484
published_at 2026-04-08T12:55:00Z
5
value 0.0027
scoring_system epss
scoring_elements 0.5043
published_at 2026-04-07T12:55:00Z
6
value 0.0027
scoring_system epss
scoring_elements 0.50448
published_at 2026-04-02T12:55:00Z
7
value 0.0027
scoring_system epss
scoring_elements 0.50485
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0767
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
22
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2170377
reference_id 2170377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2170377
24
reference_url https://alas.aws.amazon.com/AL2/ALAS-2023-1992.html
reference_id ALAS-2023-1992.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:56Z/
url https://alas.aws.amazon.com/AL2/ALAS-2023-1992.html
25
reference_url https://security.gentoo.org/glsa/202305-35
reference_id GLSA-202305-35
reference_type
scores
url https://security.gentoo.org/glsa/202305-35
26
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-05
reference_id mfsa2023-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-05
27
reference_url https://www.mozilla.org/security/advisories/mfsa2023-05/
reference_id mfsa2023-05
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:56Z/
url https://www.mozilla.org/security/advisories/mfsa2023-05/
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-06
reference_id mfsa2023-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-06
29
reference_url https://www.mozilla.org/security/advisories/mfsa2023-06/
reference_id mfsa2023-06
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:56Z/
url https://www.mozilla.org/security/advisories/mfsa2023-06/
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-07
reference_id mfsa2023-07
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-07
31
reference_url https://www.mozilla.org/security/advisories/mfsa2023-07/
reference_id mfsa2023-07
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:56Z/
url https://www.mozilla.org/security/advisories/mfsa2023-07/
32
reference_url https://access.redhat.com/errata/RHSA-2023:1252
reference_id RHSA-2023:1252
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1252
33
reference_url https://access.redhat.com/errata/RHSA-2023:1332
reference_id RHSA-2023:1332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1332
34
reference_url https://access.redhat.com/errata/RHSA-2023:1365
reference_id RHSA-2023:1365
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1365
35
reference_url https://access.redhat.com/errata/RHSA-2023:1366
reference_id RHSA-2023:1366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1366
36
reference_url https://access.redhat.com/errata/RHSA-2023:1368
reference_id RHSA-2023:1368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1368
37
reference_url https://access.redhat.com/errata/RHSA-2023:1369
reference_id RHSA-2023:1369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1369
38
reference_url https://access.redhat.com/errata/RHSA-2023:1370
reference_id RHSA-2023:1370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1370
39
reference_url https://access.redhat.com/errata/RHSA-2023:1406
reference_id RHSA-2023:1406
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1406
40
reference_url https://access.redhat.com/errata/RHSA-2023:1436
reference_id RHSA-2023:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1436
41
reference_url https://access.redhat.com/errata/RHSA-2023:1442
reference_id RHSA-2023:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1442
42
reference_url https://access.redhat.com/errata/RHSA-2023:1443
reference_id RHSA-2023:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1443
43
reference_url https://access.redhat.com/errata/RHSA-2023:1444
reference_id RHSA-2023:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1444
44
reference_url https://access.redhat.com/errata/RHSA-2023:1445
reference_id RHSA-2023:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1445
45
reference_url https://access.redhat.com/errata/RHSA-2023:1472
reference_id RHSA-2023:1472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1472
46
reference_url https://access.redhat.com/errata/RHSA-2023:1479
reference_id RHSA-2023:1479
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1479
47
reference_url https://access.redhat.com/errata/RHSA-2023:1677
reference_id RHSA-2023:1677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1677
48
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1804640
reference_id show_bug.cgi?id=1804640
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:56Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1804640
49
reference_url https://usn.ubuntu.com/5880-1/
reference_id USN-5880-1
reference_type
scores
url https://usn.ubuntu.com/5880-1/
50
reference_url https://usn.ubuntu.com/5892-1/
reference_id USN-5892-1
reference_type
scores
url https://usn.ubuntu.com/5892-1/
51
reference_url https://usn.ubuntu.com/5892-2/
reference_id USN-5892-2
reference_type
scores
url https://usn.ubuntu.com/5892-2/
52
reference_url https://usn.ubuntu.com/5943-1/
reference_id USN-5943-1
reference_type
scores
url https://usn.ubuntu.com/5943-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2023-0767
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cgvg-aj53-kkbp
6
url VCID-dh3c-g3k3-zkb7
vulnerability_id VCID-dh3c-g3k3-zkb7
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7805.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7805.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7805
reference_id
reference_type
scores
0
value 0.03211
scoring_system epss
scoring_elements 0.8703
published_at 2026-04-13T12:55:00Z
1
value 0.03851
scoring_system epss
scoring_elements 0.88141
published_at 2026-04-01T12:55:00Z
2
value 0.03851
scoring_system epss
scoring_elements 0.88207
published_at 2026-04-11T12:55:00Z
3
value 0.03851
scoring_system epss
scoring_elements 0.88197
published_at 2026-04-09T12:55:00Z
4
value 0.03851
scoring_system epss
scoring_elements 0.88191
published_at 2026-04-08T12:55:00Z
5
value 0.03851
scoring_system epss
scoring_elements 0.88149
published_at 2026-04-02T12:55:00Z
6
value 0.03851
scoring_system epss
scoring_elements 0.88199
published_at 2026-04-12T12:55:00Z
7
value 0.03851
scoring_system epss
scoring_elements 0.88166
published_at 2026-04-04T12:55:00Z
8
value 0.03851
scoring_system epss
scoring_elements 0.88171
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7805
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1377618
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1377618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
13
reference_url https://www.debian.org/security/2017/dsa-3987
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3987
14
reference_url https://www.debian.org/security/2017/dsa-3998
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3998
15
reference_url https://www.debian.org/security/2017/dsa-4014
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4014
16
reference_url https://www.mozilla.org/security/advisories/mfsa2017-21/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-21/
17
reference_url https://www.mozilla.org/security/advisories/mfsa2017-22/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-22/
18
reference_url https://www.mozilla.org/security/advisories/mfsa2017-23/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-23/
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
20
reference_url http://www.securityfocus.com/bid/101059
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101059
21
reference_url http://www.securitytracker.com/id/1039465
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039465
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471171
reference_id 1471171
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471171
23
reference_url https://security.archlinux.org/ASA-201710-19
reference_id ASA-201710-19
reference_type
scores
url https://security.archlinux.org/ASA-201710-19
24
reference_url https://security.archlinux.org/AVG-441
reference_id AVG-441
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-441
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:52.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:52.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:52.4.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:56.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:56.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:56.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:52.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:52.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:52.4.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7805
reference_id CVE-2017-7805
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7805
32
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
33
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
34
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
reference_id mfsa2017-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
35
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
reference_id mfsa2017-22
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
36
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
reference_id mfsa2017-23
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
37
reference_url https://access.redhat.com/errata/RHSA-2017:2832
reference_id RHSA-2017:2832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2832
38
reference_url https://usn.ubuntu.com/3431-1/
reference_id USN-3431-1
reference_type
scores
url https://usn.ubuntu.com/3431-1/
39
reference_url https://usn.ubuntu.com/3435-1/
reference_id USN-3435-1
reference_type
scores
url https://usn.ubuntu.com/3435-1/
40
reference_url https://usn.ubuntu.com/3436-1/
reference_id USN-3436-1
reference_type
scores
url https://usn.ubuntu.com/3436-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
aliases CVE-2017-7805
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dh3c-g3k3-zkb7
7
url VCID-ewe9-39b1-kba2
vulnerability_id VCID-ewe9-39b1-kba2
summary
A vulnerability in NSS might allow remote attackers to cause a
    Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25648.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25648.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25648
reference_id
reference_type
scores
0
value 0.00099
scoring_system epss
scoring_elements 0.27152
published_at 2026-04-01T12:55:00Z
1
value 0.00099
scoring_system epss
scoring_elements 0.27192
published_at 2026-04-02T12:55:00Z
2
value 0.00099
scoring_system epss
scoring_elements 0.27229
published_at 2026-04-04T12:55:00Z
3
value 0.00099
scoring_system epss
scoring_elements 0.27022
published_at 2026-04-07T12:55:00Z
4
value 0.00099
scoring_system epss
scoring_elements 0.27091
published_at 2026-04-08T12:55:00Z
5
value 0.00099
scoring_system epss
scoring_elements 0.27137
published_at 2026-04-09T12:55:00Z
6
value 0.00099
scoring_system epss
scoring_elements 0.27141
published_at 2026-04-11T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.27097
published_at 2026-04-12T12:55:00Z
8
value 0.00099
scoring_system epss
scoring_elements 0.2704
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25648
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1887319
reference_id 1887319
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1887319
5
reference_url https://security.gentoo.org/glsa/202012-21
reference_id GLSA-202012-21
reference_type
scores
url https://security.gentoo.org/glsa/202012-21
6
reference_url https://access.redhat.com/errata/RHSA-2021:1384
reference_id RHSA-2021:1384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1384
7
reference_url https://access.redhat.com/errata/RHSA-2021:3572
reference_id RHSA-2021:3572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3572
8
reference_url https://usn.ubuntu.com/5410-1/
reference_id USN-5410-1
reference_type
scores
url https://usn.ubuntu.com/5410-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2020-25648
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ewe9-39b1-kba2
8
url VCID-fgv4-bz59-h7g7
vulnerability_id VCID-fgv4-bz59-h7g7
summary
Multiple vulnerabilities have been found in Mozilla Network
    Security Service (NSS), the worst of which may lead to arbitrary code
    execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18508.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18508.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18508
reference_id
reference_type
scores
0
value 0.00558
scoring_system epss
scoring_elements 0.68142
published_at 2026-04-01T12:55:00Z
1
value 0.00558
scoring_system epss
scoring_elements 0.68165
published_at 2026-04-02T12:55:00Z
2
value 0.00558
scoring_system epss
scoring_elements 0.68183
published_at 2026-04-04T12:55:00Z
3
value 0.00558
scoring_system epss
scoring_elements 0.68161
published_at 2026-04-07T12:55:00Z
4
value 0.00558
scoring_system epss
scoring_elements 0.68212
published_at 2026-04-08T12:55:00Z
5
value 0.00558
scoring_system epss
scoring_elements 0.68228
published_at 2026-04-09T12:55:00Z
6
value 0.00558
scoring_system epss
scoring_elements 0.68253
published_at 2026-04-11T12:55:00Z
7
value 0.00558
scoring_system epss
scoring_elements 0.6824
published_at 2026-04-12T12:55:00Z
8
value 0.00558
scoring_system epss
scoring_elements 0.68206
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1671310
reference_id 1671310
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1671310
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921614
reference_id 921614
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921614
6
reference_url https://security.gentoo.org/glsa/202003-37
reference_id GLSA-202003-37
reference_type
scores
url https://security.gentoo.org/glsa/202003-37
7
reference_url https://access.redhat.com/errata/RHSA-2019:1951
reference_id RHSA-2019:1951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1951
8
reference_url https://usn.ubuntu.com/3898-1/
reference_id USN-3898-1
reference_type
scores
url https://usn.ubuntu.com/3898-1/
9
reference_url https://usn.ubuntu.com/3898-2/
reference_id USN-3898-2
reference_type
scores
url https://usn.ubuntu.com/3898-2/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
aliases CVE-2018-18508
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fgv4-bz59-h7g7
9
url VCID-hs5f-21nx-gfeb
vulnerability_id VCID-hs5f-21nx-gfeb
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11729.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11729.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11729
reference_id
reference_type
scores
0
value 0.0055
scoring_system epss
scoring_elements 0.67967
published_at 2026-04-13T12:55:00Z
1
value 0.0055
scoring_system epss
scoring_elements 0.67949
published_at 2026-04-04T12:55:00Z
2
value 0.0055
scoring_system epss
scoring_elements 0.67927
published_at 2026-04-07T12:55:00Z
3
value 0.0055
scoring_system epss
scoring_elements 0.67978
published_at 2026-04-08T12:55:00Z
4
value 0.0055
scoring_system epss
scoring_elements 0.67991
published_at 2026-04-09T12:55:00Z
5
value 0.0055
scoring_system epss
scoring_elements 0.68015
published_at 2026-04-11T12:55:00Z
6
value 0.0055
scoring_system epss
scoring_elements 0.68001
published_at 2026-04-12T12:55:00Z
7
value 0.0055
scoring_system epss
scoring_elements 0.67907
published_at 2026-04-01T12:55:00Z
8
value 0.0055
scoring_system epss
scoring_elements 0.6793
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11729
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1728437
reference_id 1728437
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1728437
5
reference_url https://security.archlinux.org/ASA-201907-4
reference_id ASA-201907-4
reference_type
scores
url https://security.archlinux.org/ASA-201907-4
6
reference_url https://security.archlinux.org/AVG-1002
reference_id AVG-1002
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1002
7
reference_url https://security.gentoo.org/glsa/201908-12
reference_id GLSA-201908-12
reference_type
scores
url https://security.gentoo.org/glsa/201908-12
8
reference_url https://security.gentoo.org/glsa/201908-20
reference_id GLSA-201908-20
reference_type
scores
url https://security.gentoo.org/glsa/201908-20
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-21
reference_id mfsa2019-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-21
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-22
reference_id mfsa2019-22
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-22
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-23
reference_id mfsa2019-23
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-23
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-28
reference_id mfsa2019-28
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-28
13
reference_url https://access.redhat.com/errata/RHSA-2019:1951
reference_id RHSA-2019:1951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1951
14
reference_url https://access.redhat.com/errata/RHSA-2019:4190
reference_id RHSA-2019:4190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4190
15
reference_url https://usn.ubuntu.com/4054-1/
reference_id USN-4054-1
reference_type
scores
url https://usn.ubuntu.com/4054-1/
16
reference_url https://usn.ubuntu.com/4060-1/
reference_id USN-4060-1
reference_type
scores
url https://usn.ubuntu.com/4060-1/
17
reference_url https://usn.ubuntu.com/4060-2/
reference_id USN-4060-2
reference_type
scores
url https://usn.ubuntu.com/4060-2/
18
reference_url https://usn.ubuntu.com/4064-1/
reference_id USN-4064-1
reference_type
scores
url https://usn.ubuntu.com/4064-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2019-11729
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hs5f-21nx-gfeb
10
url VCID-jrsz-ynp7-wbb2
vulnerability_id VCID-jrsz-ynp7-wbb2
summary Multiple vulnerabilities have been discovered in NSS, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43527.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43527.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-43527
reference_id
reference_type
scores
0
value 0.05243
scoring_system epss
scoring_elements 0.89954
published_at 2026-04-07T12:55:00Z
1
value 0.05243
scoring_system epss
scoring_elements 0.89971
published_at 2026-04-08T12:55:00Z
2
value 0.05243
scoring_system epss
scoring_elements 0.89976
published_at 2026-04-09T12:55:00Z
3
value 0.05243
scoring_system epss
scoring_elements 0.89982
published_at 2026-04-12T12:55:00Z
4
value 0.05243
scoring_system epss
scoring_elements 0.89984
published_at 2026-04-11T12:55:00Z
5
value 0.05243
scoring_system epss
scoring_elements 0.89975
published_at 2026-04-13T12:55:00Z
6
value 0.0538
scoring_system epss
scoring_elements 0.9008
published_at 2026-04-04T12:55:00Z
7
value 0.0538
scoring_system epss
scoring_elements 0.90065
published_at 2026-04-01T12:55:00Z
8
value 0.0538
scoring_system epss
scoring_elements 0.90068
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-43527
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2024370
reference_id 2024370
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2024370
5
reference_url https://security.archlinux.org/ASA-202112-3
reference_id ASA-202112-3
reference_type
scores
url https://security.archlinux.org/ASA-202112-3
6
reference_url https://security.archlinux.org/ASA-202112-4
reference_id ASA-202112-4
reference_type
scores
url https://security.archlinux.org/ASA-202112-4
7
reference_url https://security.archlinux.org/AVG-2596
reference_id AVG-2596
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2596
8
reference_url https://security.archlinux.org/AVG-2597
reference_id AVG-2597
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2597
9
reference_url https://security.gentoo.org/glsa/202212-05
reference_id GLSA-202212-05
reference_type
scores
url https://security.gentoo.org/glsa/202212-05
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-51
reference_id mfsa2021-51
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-51
11
reference_url https://access.redhat.com/errata/RHSA-2021:4903
reference_id RHSA-2021:4903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4903
12
reference_url https://access.redhat.com/errata/RHSA-2021:4904
reference_id RHSA-2021:4904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4904
13
reference_url https://access.redhat.com/errata/RHSA-2021:4907
reference_id RHSA-2021:4907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4907
14
reference_url https://access.redhat.com/errata/RHSA-2021:4909
reference_id RHSA-2021:4909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4909
15
reference_url https://access.redhat.com/errata/RHSA-2021:4919
reference_id RHSA-2021:4919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4919
16
reference_url https://access.redhat.com/errata/RHSA-2021:4932
reference_id RHSA-2021:4932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4932
17
reference_url https://access.redhat.com/errata/RHSA-2021:4933
reference_id RHSA-2021:4933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4933
18
reference_url https://access.redhat.com/errata/RHSA-2021:4946
reference_id RHSA-2021:4946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4946
19
reference_url https://access.redhat.com/errata/RHSA-2021:4953
reference_id RHSA-2021:4953
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4953
20
reference_url https://access.redhat.com/errata/RHSA-2021:4954
reference_id RHSA-2021:4954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4954
21
reference_url https://access.redhat.com/errata/RHSA-2021:4969
reference_id RHSA-2021:4969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4969
22
reference_url https://access.redhat.com/errata/RHSA-2021:4994
reference_id RHSA-2021:4994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4994
23
reference_url https://access.redhat.com/errata/RHSA-2021:5006
reference_id RHSA-2021:5006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5006
24
reference_url https://access.redhat.com/errata/RHSA-2021:5035
reference_id RHSA-2021:5035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5035
25
reference_url https://usn.ubuntu.com/5168-1/
reference_id USN-5168-1
reference_type
scores
url https://usn.ubuntu.com/5168-1/
26
reference_url https://usn.ubuntu.com/5168-2/
reference_id USN-5168-2
reference_type
scores
url https://usn.ubuntu.com/5168-2/
27
reference_url https://usn.ubuntu.com/5168-3/
reference_id USN-5168-3
reference_type
scores
url https://usn.ubuntu.com/5168-3/
28
reference_url https://usn.ubuntu.com/5168-4/
reference_id USN-5168-4
reference_type
scores
url https://usn.ubuntu.com/5168-4/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2021-43527
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jrsz-ynp7-wbb2
11
url VCID-jvrr-2gej-bfby
vulnerability_id VCID-jvrr-2gej-bfby
summary nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12384.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12384.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12384
reference_id
reference_type
scores
0
value 0.00622
scoring_system epss
scoring_elements 0.70029
published_at 2026-04-01T12:55:00Z
1
value 0.00622
scoring_system epss
scoring_elements 0.70041
published_at 2026-04-02T12:55:00Z
2
value 0.00622
scoring_system epss
scoring_elements 0.70056
published_at 2026-04-04T12:55:00Z
3
value 0.00622
scoring_system epss
scoring_elements 0.70034
published_at 2026-04-07T12:55:00Z
4
value 0.00622
scoring_system epss
scoring_elements 0.70081
published_at 2026-04-08T12:55:00Z
5
value 0.00622
scoring_system epss
scoring_elements 0.70097
published_at 2026-04-09T12:55:00Z
6
value 0.00622
scoring_system epss
scoring_elements 0.7012
published_at 2026-04-11T12:55:00Z
7
value 0.00622
scoring_system epss
scoring_elements 0.70106
published_at 2026-04-12T12:55:00Z
8
value 0.00622
scoring_system epss
scoring_elements 0.70093
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12384
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12384
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1622089
reference_id 1622089
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1622089
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908332
reference_id 908332
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908332
6
reference_url https://access.redhat.com/errata/RHSA-2018:2768
reference_id RHSA-2018:2768
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2768
7
reference_url https://access.redhat.com/errata/RHSA-2018:2898
reference_id RHSA-2018:2898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2898
8
reference_url https://usn.ubuntu.com/3850-1/
reference_id USN-3850-1
reference_type
scores
url https://usn.ubuntu.com/3850-1/
9
reference_url https://usn.ubuntu.com/3850-2/
reference_id USN-3850-2
reference_type
scores
url https://usn.ubuntu.com/3850-2/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
aliases CVE-2018-12384
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jvrr-2gej-bfby
12
url VCID-k2s2-zkua-8ydy
vulnerability_id VCID-k2s2-zkua-8ydy
summary
NSS has an information disclosure vulnerability when handling DSA
    keys.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12399.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12399.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12399
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26737
published_at 2026-04-13T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.2693
published_at 2026-04-04T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26718
published_at 2026-04-07T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26787
published_at 2026-04-08T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26836
published_at 2026-04-09T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26839
published_at 2026-04-11T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26794
published_at 2026-04-12T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26854
published_at 2026-04-01T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26895
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12399
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1826177
reference_id 1826177
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1826177
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961752
reference_id 961752
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961752
13
reference_url https://security.archlinux.org/ASA-202006-1
reference_id ASA-202006-1
reference_type
scores
url https://security.archlinux.org/ASA-202006-1
14
reference_url https://security.archlinux.org/ASA-202006-4
reference_id ASA-202006-4
reference_type
scores
url https://security.archlinux.org/ASA-202006-4
15
reference_url https://security.archlinux.org/AVG-1173
reference_id AVG-1173
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1173
16
reference_url https://security.archlinux.org/AVG-1179
reference_id AVG-1179
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1179
17
reference_url https://security.gentoo.org/glsa/202007-49
reference_id GLSA-202007-49
reference_type
scores
url https://security.gentoo.org/glsa/202007-49
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-20
reference_id mfsa2020-20
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-20
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-21
reference_id mfsa2020-21
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-21
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-22
reference_id mfsa2020-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-22
21
reference_url https://access.redhat.com/errata/RHSA-2020:3280
reference_id RHSA-2020:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3280
22
reference_url https://usn.ubuntu.com/4383-1/
reference_id USN-4383-1
reference_type
scores
url https://usn.ubuntu.com/4383-1/
23
reference_url https://usn.ubuntu.com/4397-1/
reference_id USN-4397-1
reference_type
scores
url https://usn.ubuntu.com/4397-1/
24
reference_url https://usn.ubuntu.com/4397-2/
reference_id USN-4397-2
reference_type
scores
url https://usn.ubuntu.com/4397-2/
25
reference_url https://usn.ubuntu.com/4421-1/
reference_id USN-4421-1
reference_type
scores
url https://usn.ubuntu.com/4421-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2020-12399
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k2s2-zkua-8ydy
13
url VCID-k4a4-f1as-x3bj
vulnerability_id VCID-k4a4-f1as-x3bj
summary
NSS has multiple information disclosure vulnerabilities when
    handling secret key material.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12400.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12400.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12400
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.35057
published_at 2026-04-13T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.35115
published_at 2026-04-11T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35082
published_at 2026-04-12T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.34934
published_at 2026-04-01T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.35132
published_at 2026-04-02T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.35161
published_at 2026-04-04T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.3504
published_at 2026-04-07T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35085
published_at 2026-04-08T12:55:00Z
8
value 0.00147
scoring_system epss
scoring_elements 0.35111
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12400
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1853983
reference_id 1853983
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1853983
4
reference_url https://security.gentoo.org/glsa/202008-08
reference_id GLSA-202008-08
reference_type
scores
url https://security.gentoo.org/glsa/202008-08
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
reference_id mfsa2020-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
7
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
8
reference_url https://access.redhat.com/errata/RHSA-2021:0538
reference_id RHSA-2021:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0538
9
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
10
reference_url https://usn.ubuntu.com/4455-1/
reference_id USN-4455-1
reference_type
scores
url https://usn.ubuntu.com/4455-1/
11
reference_url https://usn.ubuntu.com/4474-1/
reference_id USN-4474-1
reference_type
scores
url https://usn.ubuntu.com/4474-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2020-12400
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k4a4-f1as-x3bj
14
url VCID-mx8t-s47w-wud5
vulnerability_id VCID-mx8t-s47w-wud5
summary When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6829.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6829.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6829
reference_id
reference_type
scores
0
value 0.00584
scoring_system epss
scoring_elements 0.69005
published_at 2026-04-13T12:55:00Z
1
value 0.00584
scoring_system epss
scoring_elements 0.69049
published_at 2026-04-11T12:55:00Z
2
value 0.00584
scoring_system epss
scoring_elements 0.69034
published_at 2026-04-12T12:55:00Z
3
value 0.00584
scoring_system epss
scoring_elements 0.6894
published_at 2026-04-01T12:55:00Z
4
value 0.00584
scoring_system epss
scoring_elements 0.68958
published_at 2026-04-02T12:55:00Z
5
value 0.00584
scoring_system epss
scoring_elements 0.68978
published_at 2026-04-04T12:55:00Z
6
value 0.00584
scoring_system epss
scoring_elements 0.68957
published_at 2026-04-07T12:55:00Z
7
value 0.00584
scoring_system epss
scoring_elements 0.69007
published_at 2026-04-08T12:55:00Z
8
value 0.00584
scoring_system epss
scoring_elements 0.69027
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6829
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1826187
reference_id 1826187
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1826187
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
reference_id mfsa2020-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
6
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
7
reference_url https://access.redhat.com/errata/RHSA-2021:0538
reference_id RHSA-2021:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0538
8
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
9
reference_url https://usn.ubuntu.com/4455-1/
reference_id USN-4455-1
reference_type
scores
url https://usn.ubuntu.com/4455-1/
10
reference_url https://usn.ubuntu.com/4474-1/
reference_id USN-4474-1
reference_type
scores
url https://usn.ubuntu.com/4474-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2020-6829
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mx8t-s47w-wud5
15
url VCID-paez-g9wh-mfeq
vulnerability_id VCID-paez-g9wh-mfeq
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6609
reference_id
reference_type
scores
0
value 0.00572
scoring_system epss
scoring_elements 0.68638
published_at 2026-04-04T12:55:00Z
1
value 0.00572
scoring_system epss
scoring_elements 0.68664
published_at 2026-04-13T12:55:00Z
2
value 0.00572
scoring_system epss
scoring_elements 0.68694
published_at 2026-04-12T12:55:00Z
3
value 0.00572
scoring_system epss
scoring_elements 0.68707
published_at 2026-04-11T12:55:00Z
4
value 0.00572
scoring_system epss
scoring_elements 0.68614
published_at 2026-04-07T12:55:00Z
5
value 0.00572
scoring_system epss
scoring_elements 0.6862
published_at 2026-04-02T12:55:00Z
6
value 0.00572
scoring_system epss
scoring_elements 0.68683
published_at 2026-04-09T12:55:00Z
7
value 0.00572
scoring_system epss
scoring_elements 0.68665
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6609
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6609
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
reference_id mfsa2024-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
5
reference_url https://www.mozilla.org/security/advisories/mfsa2024-29/
reference_id mfsa2024-29
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-22T19:02:00Z/
url https://www.mozilla.org/security/advisories/mfsa2024-29/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
reference_id mfsa2024-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
7
reference_url https://www.mozilla.org/security/advisories/mfsa2024-32/
reference_id mfsa2024-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-22T19:02:00Z/
url https://www.mozilla.org/security/advisories/mfsa2024-32/
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1839258
reference_id show_bug.cgi?id=1839258
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-22T19:02:00Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1839258
9
reference_url https://usn.ubuntu.com/6890-1/
reference_id USN-6890-1
reference_type
scores
url https://usn.ubuntu.com/6890-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-gret-hn3p-5kbk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1
aliases CVE-2024-6609
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-paez-g9wh-mfeq
16
url VCID-rk7t-zjzg-eqar
vulnerability_id VCID-rk7t-zjzg-eqar
summary
NSS has multiple information disclosure vulnerabilities when
    handling secret key material.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12401.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12401.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12401
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40566
published_at 2026-04-13T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40604
published_at 2026-04-09T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40585
published_at 2026-04-12T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40514
published_at 2026-04-01T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40595
published_at 2026-04-08T12:55:00Z
5
value 0.00187
scoring_system epss
scoring_elements 0.40622
published_at 2026-04-11T12:55:00Z
6
value 0.00187
scoring_system epss
scoring_elements 0.40544
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12401
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1851294
reference_id 1851294
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1851294
4
reference_url https://security.gentoo.org/glsa/202008-08
reference_id GLSA-202008-08
reference_type
scores
url https://security.gentoo.org/glsa/202008-08
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
reference_id mfsa2020-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
7
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
8
reference_url https://access.redhat.com/errata/RHSA-2021:0538
reference_id RHSA-2021:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0538
9
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
10
reference_url https://usn.ubuntu.com/4455-1/
reference_id USN-4455-1
reference_type
scores
url https://usn.ubuntu.com/4455-1/
11
reference_url https://usn.ubuntu.com/4474-1/
reference_id USN-4474-1
reference_type
scores
url https://usn.ubuntu.com/4474-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2020-12401
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rk7t-zjzg-eqar
17
url VCID-szzk-wxm2-cfgj
vulnerability_id VCID-szzk-wxm2-cfgj
summary
NSS has multiple information disclosure vulnerabilities when
    handling secret key material.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12403.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12403.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12403
reference_id
reference_type
scores
0
value 0.00635
scoring_system epss
scoring_elements 0.70331
published_at 2026-04-01T12:55:00Z
1
value 0.00635
scoring_system epss
scoring_elements 0.70344
published_at 2026-04-02T12:55:00Z
2
value 0.00635
scoring_system epss
scoring_elements 0.70361
published_at 2026-04-04T12:55:00Z
3
value 0.00635
scoring_system epss
scoring_elements 0.70339
published_at 2026-04-07T12:55:00Z
4
value 0.00635
scoring_system epss
scoring_elements 0.70385
published_at 2026-04-08T12:55:00Z
5
value 0.00635
scoring_system epss
scoring_elements 0.704
published_at 2026-04-09T12:55:00Z
6
value 0.00635
scoring_system epss
scoring_elements 0.70424
published_at 2026-04-11T12:55:00Z
7
value 0.00635
scoring_system epss
scoring_elements 0.70408
published_at 2026-04-12T12:55:00Z
8
value 0.00635
scoring_system epss
scoring_elements 0.70394
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12403
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1868931
reference_id 1868931
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1868931
4
reference_url https://security.gentoo.org/glsa/202008-08
reference_id GLSA-202008-08
reference_type
scores
url https://security.gentoo.org/glsa/202008-08
5
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
6
reference_url https://access.redhat.com/errata/RHSA-2021:0538
reference_id RHSA-2021:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0538
7
reference_url https://access.redhat.com/errata/RHSA-2021:0758
reference_id RHSA-2021:0758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0758
8
reference_url https://access.redhat.com/errata/RHSA-2021:0876
reference_id RHSA-2021:0876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0876
9
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
10
reference_url https://access.redhat.com/errata/RHSA-2021:1026
reference_id RHSA-2021:1026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1026
11
reference_url https://usn.ubuntu.com/4476-1/
reference_id USN-4476-1
reference_type
scores
url https://usn.ubuntu.com/4476-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2020-12403
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-szzk-wxm2-cfgj
18
url VCID-vjas-pry4-93cz
vulnerability_id VCID-vjas-pry4-93cz
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12402.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12402.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12402
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.28029
published_at 2026-04-13T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.28122
published_at 2026-04-09T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.28129
published_at 2026-04-11T12:55:00Z
3
value 0.00102
scoring_system epss
scoring_elements 0.28086
published_at 2026-04-12T12:55:00Z
4
value 0.00102
scoring_system epss
scoring_elements 0.28102
published_at 2026-04-01T12:55:00Z
5
value 0.00102
scoring_system epss
scoring_elements 0.28174
published_at 2026-04-02T12:55:00Z
6
value 0.00102
scoring_system epss
scoring_elements 0.28218
published_at 2026-04-04T12:55:00Z
7
value 0.00102
scoring_system epss
scoring_elements 0.28012
published_at 2026-04-07T12:55:00Z
8
value 0.00102
scoring_system epss
scoring_elements 0.28079
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12402
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1826231
reference_id 1826231
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1826231
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963152
reference_id 963152
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963152
9
reference_url https://security.gentoo.org/glsa/202007-10
reference_id GLSA-202007-10
reference_type
scores
url https://security.gentoo.org/glsa/202007-10
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-24
reference_id mfsa2020-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-24
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-29
reference_id mfsa2020-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-29
12
reference_url https://access.redhat.com/errata/RHSA-2020:3280
reference_id RHSA-2020:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3280
13
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
14
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
15
reference_url https://usn.ubuntu.com/4417-1/
reference_id USN-4417-1
reference_type
scores
url https://usn.ubuntu.com/4417-1/
16
reference_url https://usn.ubuntu.com/4417-2/
reference_id USN-4417-2
reference_type
scores
url https://usn.ubuntu.com/4417-2/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2020-12402
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vjas-pry4-93cz
19
url VCID-vszp-vyxy-f7g7
vulnerability_id VCID-vszp-vyxy-f7g7
summary Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2781.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2781
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15358
published_at 2026-04-13T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15422
published_at 2026-04-12T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15461
published_at 2026-04-11T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15497
published_at 2026-04-09T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15489
published_at 2026-04-02T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15447
published_at 2026-04-08T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.1536
published_at 2026-04-07T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.1556
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2781
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2781
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442292
reference_id 2442292
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442292
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
reference_id mfsa2026-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-13
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-13/
reference_id mfsa2026-13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:07:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-13/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
reference_id mfsa2026-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-15
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-15/
reference_id mfsa2026-15
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:07:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-15/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
reference_id mfsa2026-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-16
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-16/
reference_id mfsa2026-16
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:07:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-16/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
reference_id mfsa2026-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-17
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-17/
reference_id mfsa2026-17
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:07:29Z/
url https://www.mozilla.org/security/advisories/mfsa2026-17/
13
reference_url https://access.redhat.com/errata/RHSA-2026:3338
reference_id RHSA-2026:3338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3338
14
reference_url https://access.redhat.com/errata/RHSA-2026:3339
reference_id RHSA-2026:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3339
15
reference_url https://access.redhat.com/errata/RHSA-2026:3361
reference_id RHSA-2026:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3361
16
reference_url https://access.redhat.com/errata/RHSA-2026:3491
reference_id RHSA-2026:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3491
17
reference_url https://access.redhat.com/errata/RHSA-2026:3492
reference_id RHSA-2026:3492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3492
18
reference_url https://access.redhat.com/errata/RHSA-2026:3493
reference_id RHSA-2026:3493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3493
19
reference_url https://access.redhat.com/errata/RHSA-2026:3494
reference_id RHSA-2026:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3494
20
reference_url https://access.redhat.com/errata/RHSA-2026:3495
reference_id RHSA-2026:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3495
21
reference_url https://access.redhat.com/errata/RHSA-2026:3496
reference_id RHSA-2026:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3496
22
reference_url https://access.redhat.com/errata/RHSA-2026:3497
reference_id RHSA-2026:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3497
23
reference_url https://access.redhat.com/errata/RHSA-2026:3515
reference_id RHSA-2026:3515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3515
24
reference_url https://access.redhat.com/errata/RHSA-2026:3516
reference_id RHSA-2026:3516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3516
25
reference_url https://access.redhat.com/errata/RHSA-2026:3517
reference_id RHSA-2026:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3517
26
reference_url https://access.redhat.com/errata/RHSA-2026:3976
reference_id RHSA-2026:3976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3976
27
reference_url https://access.redhat.com/errata/RHSA-2026:3978
reference_id RHSA-2026:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3978
28
reference_url https://access.redhat.com/errata/RHSA-2026:3979
reference_id RHSA-2026:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3979
29
reference_url https://access.redhat.com/errata/RHSA-2026:3980
reference_id RHSA-2026:3980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3980
30
reference_url https://access.redhat.com/errata/RHSA-2026:3981
reference_id RHSA-2026:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3981
31
reference_url https://access.redhat.com/errata/RHSA-2026:3982
reference_id RHSA-2026:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3982
32
reference_url https://access.redhat.com/errata/RHSA-2026:3983
reference_id RHSA-2026:3983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3983
33
reference_url https://access.redhat.com/errata/RHSA-2026:3984
reference_id RHSA-2026:3984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3984
34
reference_url https://access.redhat.com/errata/RHSA-2026:4022
reference_id RHSA-2026:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4022
35
reference_url https://access.redhat.com/errata/RHSA-2026:4152
reference_id RHSA-2026:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4152
36
reference_url https://access.redhat.com/errata/RHSA-2026:4260
reference_id RHSA-2026:4260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4260
37
reference_url https://access.redhat.com/errata/RHSA-2026:4432
reference_id RHSA-2026:4432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4432
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2009552
reference_id show_bug.cgi?id=2009552
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-26T20:07:29Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2009552
39
reference_url https://usn.ubuntu.com/8071-1/
reference_id USN-8071-1
reference_type
scores
url https://usn.ubuntu.com/8071-1/
40
reference_url https://usn.ubuntu.com/8071-2/
reference_id USN-8071-2
reference_type
scores
url https://usn.ubuntu.com/8071-2/
fixed_packages
0
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-gret-hn3p-5kbk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1
aliases CVE-2026-2781
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vszp-vyxy-f7g7
20
url VCID-vzb9-aeqz-hybr
vulnerability_id VCID-vzb9-aeqz-hybr
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11745.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11745.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11745
reference_id
reference_type
scores
0
value 0.00806
scoring_system epss
scoring_elements 0.74149
published_at 2026-04-13T12:55:00Z
1
value 0.00806
scoring_system epss
scoring_elements 0.74133
published_at 2026-04-04T12:55:00Z
2
value 0.00806
scoring_system epss
scoring_elements 0.74105
published_at 2026-04-07T12:55:00Z
3
value 0.00806
scoring_system epss
scoring_elements 0.74137
published_at 2026-04-08T12:55:00Z
4
value 0.00806
scoring_system epss
scoring_elements 0.74152
published_at 2026-04-09T12:55:00Z
5
value 0.00806
scoring_system epss
scoring_elements 0.74174
published_at 2026-04-11T12:55:00Z
6
value 0.00806
scoring_system epss
scoring_elements 0.74155
published_at 2026-04-12T12:55:00Z
7
value 0.00806
scoring_system epss
scoring_elements 0.74101
published_at 2026-04-01T12:55:00Z
8
value 0.00806
scoring_system epss
scoring_elements 0.74107
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17007
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1774831
reference_id 1774831
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1774831
6
reference_url https://security.archlinux.org/ASA-201912-1
reference_id ASA-201912-1
reference_type
scores
url https://security.archlinux.org/ASA-201912-1
7
reference_url https://security.archlinux.org/ASA-201912-2
reference_id ASA-201912-2
reference_type
scores
url https://security.archlinux.org/ASA-201912-2
8
reference_url https://security.archlinux.org/AVG-1071
reference_id AVG-1071
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1071
9
reference_url https://security.archlinux.org/AVG-1072
reference_id AVG-1072
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1072
10
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
11
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
12
reference_url https://security.gentoo.org/glsa/202003-37
reference_id GLSA-202003-37
reference_type
scores
url https://security.gentoo.org/glsa/202003-37
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
reference_id mfsa2019-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
reference_id mfsa2019-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
reference_id mfsa2019-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
16
reference_url https://access.redhat.com/errata/RHSA-2019:4114
reference_id RHSA-2019:4114
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4114
17
reference_url https://access.redhat.com/errata/RHSA-2019:4152
reference_id RHSA-2019:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4152
18
reference_url https://access.redhat.com/errata/RHSA-2019:4190
reference_id RHSA-2019:4190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4190
19
reference_url https://access.redhat.com/errata/RHSA-2020:0243
reference_id RHSA-2020:0243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0243
20
reference_url https://access.redhat.com/errata/RHSA-2020:0466
reference_id RHSA-2020:0466
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0466
21
reference_url https://access.redhat.com/errata/RHSA-2020:1267
reference_id RHSA-2020:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1267
22
reference_url https://access.redhat.com/errata/RHSA-2020:1345
reference_id RHSA-2020:1345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1345
23
reference_url https://access.redhat.com/errata/RHSA-2020:1461
reference_id RHSA-2020:1461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1461
24
reference_url https://usn.ubuntu.com/4203-1/
reference_id USN-4203-1
reference_type
scores
url https://usn.ubuntu.com/4203-1/
25
reference_url https://usn.ubuntu.com/4203-2/
reference_id USN-4203-2
reference_type
scores
url https://usn.ubuntu.com/4203-2/
26
reference_url https://usn.ubuntu.com/4216-1/
reference_id USN-4216-1
reference_type
scores
url https://usn.ubuntu.com/4216-1/
27
reference_url https://usn.ubuntu.com/4216-2/
reference_id USN-4216-2
reference_type
scores
url https://usn.ubuntu.com/4216-2/
28
reference_url https://usn.ubuntu.com/4241-1/
reference_id USN-4241-1
reference_type
scores
url https://usn.ubuntu.com/4241-1/
29
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2019-11745
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vzb9-aeqz-hybr
21
url VCID-w794-gqex-83du
vulnerability_id VCID-w794-gqex-83du
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6602.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6602.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6602
reference_id
reference_type
scores
0
value 0.00768
scoring_system epss
scoring_elements 0.7349
published_at 2026-04-13T12:55:00Z
1
value 0.00768
scoring_system epss
scoring_elements 0.73497
published_at 2026-04-12T12:55:00Z
2
value 0.00768
scoring_system epss
scoring_elements 0.73448
published_at 2026-04-02T12:55:00Z
3
value 0.00768
scoring_system epss
scoring_elements 0.73493
published_at 2026-04-09T12:55:00Z
4
value 0.00768
scoring_system epss
scoring_elements 0.7348
published_at 2026-04-08T12:55:00Z
5
value 0.00768
scoring_system epss
scoring_elements 0.73443
published_at 2026-04-07T12:55:00Z
6
value 0.00768
scoring_system epss
scoring_elements 0.73471
published_at 2026-04-04T12:55:00Z
7
value 0.00768
scoring_system epss
scoring_elements 0.73517
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6602
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2296637
reference_id 2296637
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2296637
9
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
10
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
11
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
reference_id mfsa2024-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-29/
reference_id mfsa2024-29
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-29/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-30
reference_id mfsa2024-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-30
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-30/
reference_id mfsa2024-30
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-30/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-31
reference_id mfsa2024-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-31
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-31/
reference_id mfsa2024-31
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-31/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
reference_id mfsa2024-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-32/
reference_id mfsa2024-32
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-32/
20
reference_url https://access.redhat.com/errata/RHSA-2024:4625
reference_id RHSA-2024:4625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4625
21
reference_url https://access.redhat.com/errata/RHSA-2024:4670
reference_id RHSA-2024:4670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4670
22
reference_url https://access.redhat.com/errata/RHSA-2024:4671
reference_id RHSA-2024:4671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4671
23
reference_url https://access.redhat.com/errata/RHSA-2024:4717
reference_id RHSA-2024:4717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4717
24
reference_url https://access.redhat.com/errata/RHSA-2024:4718
reference_id RHSA-2024:4718
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4718
25
reference_url https://access.redhat.com/errata/RHSA-2024:4894
reference_id RHSA-2024:4894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4894
26
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
27
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1895032
reference_id show_bug.cgi?id=1895032
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1895032
28
reference_url https://usn.ubuntu.com/6890-1/
reference_id USN-6890-1
reference_type
scores
url https://usn.ubuntu.com/6890-1/
29
reference_url https://usn.ubuntu.com/6903-1/
reference_id USN-6903-1
reference_type
scores
url https://usn.ubuntu.com/6903-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1
purl pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-gret-hn3p-5kbk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.87.1-1%252Bdeb12u1
aliases CVE-2024-6602
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w794-gqex-83du
22
url VCID-wavp-f4kn-j3cm
vulnerability_id VCID-wavp-f4kn-j3cm
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11727.json
reference_id
reference_type
scores
0
value 3.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11727.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11727
reference_id
reference_type
scores
0
value 0.00248
scoring_system epss
scoring_elements 0.48111
published_at 2026-04-13T12:55:00Z
1
value 0.00248
scoring_system epss
scoring_elements 0.48106
published_at 2026-04-08T12:55:00Z
2
value 0.00248
scoring_system epss
scoring_elements 0.48101
published_at 2026-04-09T12:55:00Z
3
value 0.00248
scoring_system epss
scoring_elements 0.48124
published_at 2026-04-11T12:55:00Z
4
value 0.00248
scoring_system epss
scoring_elements 0.481
published_at 2026-04-12T12:55:00Z
5
value 0.00248
scoring_system epss
scoring_elements 0.48045
published_at 2026-04-01T12:55:00Z
6
value 0.00248
scoring_system epss
scoring_elements 0.48082
published_at 2026-04-02T12:55:00Z
7
value 0.00248
scoring_system epss
scoring_elements 0.48103
published_at 2026-04-04T12:55:00Z
8
value 0.00248
scoring_system epss
scoring_elements 0.48053
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11727
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1730988
reference_id 1730988
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1730988
5
reference_url https://security.archlinux.org/ASA-201907-4
reference_id ASA-201907-4
reference_type
scores
url https://security.archlinux.org/ASA-201907-4
6
reference_url https://security.archlinux.org/AVG-1002
reference_id AVG-1002
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1002
7
reference_url https://security.gentoo.org/glsa/201908-12
reference_id GLSA-201908-12
reference_type
scores
url https://security.gentoo.org/glsa/201908-12
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-21
reference_id mfsa2019-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-21
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-28
reference_id mfsa2019-28
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-28
10
reference_url https://access.redhat.com/errata/RHSA-2019:1951
reference_id RHSA-2019:1951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1951
11
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
12
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
13
reference_url https://usn.ubuntu.com/4054-1/
reference_id USN-4054-1
reference_type
scores
url https://usn.ubuntu.com/4054-1/
14
reference_url https://usn.ubuntu.com/4060-1/
reference_id USN-4060-1
reference_type
scores
url https://usn.ubuntu.com/4060-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2019-11727
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wavp-f4kn-j3cm
23
url VCID-x1ty-wqph-gkak
vulnerability_id VCID-x1ty-wqph-gkak
summary nss: Handling of Netscape Certificate Sequences in CERT_DecodeCertPackage() may crash with a NULL deref leading to DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17007.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17007.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17007
reference_id
reference_type
scores
0
value 0.00308
scoring_system epss
scoring_elements 0.53893
published_at 2026-04-01T12:55:00Z
1
value 0.00308
scoring_system epss
scoring_elements 0.5391
published_at 2026-04-02T12:55:00Z
2
value 0.00308
scoring_system epss
scoring_elements 0.53938
published_at 2026-04-04T12:55:00Z
3
value 0.00308
scoring_system epss
scoring_elements 0.53913
published_at 2026-04-07T12:55:00Z
4
value 0.00308
scoring_system epss
scoring_elements 0.53965
published_at 2026-04-08T12:55:00Z
5
value 0.00308
scoring_system epss
scoring_elements 0.53964
published_at 2026-04-09T12:55:00Z
6
value 0.00308
scoring_system epss
scoring_elements 0.54011
published_at 2026-04-11T12:55:00Z
7
value 0.00308
scoring_system epss
scoring_elements 0.53994
published_at 2026-04-12T12:55:00Z
8
value 0.00308
scoring_system epss
scoring_elements 0.53976
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17007
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1703979
reference_id 1703979
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1703979
6
reference_url https://access.redhat.com/errata/RHSA-2019:1951
reference_id RHSA-2019:1951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1951
7
reference_url https://access.redhat.com/errata/RHSA-2019:2237
reference_id RHSA-2019:2237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2237
8
reference_url https://access.redhat.com/errata/RHSA-2021:0876
reference_id RHSA-2021:0876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0876
9
reference_url https://usn.ubuntu.com/4215-1/
reference_id USN-4215-1
reference_type
scores
url https://usn.ubuntu.com/4215-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2019-17007
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x1ty-wqph-gkak
24
url VCID-y43f-tmvr-hqas
vulnerability_id VCID-y43f-tmvr-hqas
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22747.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22747.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22747
reference_id
reference_type
scores
0
value 0.0013
scoring_system epss
scoring_elements 0.32419
published_at 2026-04-13T12:55:00Z
1
value 0.0013
scoring_system epss
scoring_elements 0.32446
published_at 2026-04-12T12:55:00Z
2
value 0.0013
scoring_system epss
scoring_elements 0.32582
published_at 2026-04-04T12:55:00Z
3
value 0.0013
scoring_system epss
scoring_elements 0.32546
published_at 2026-04-02T12:55:00Z
4
value 0.0013
scoring_system epss
scoring_elements 0.32485
published_at 2026-04-11T12:55:00Z
5
value 0.0013
scoring_system epss
scoring_elements 0.3248
published_at 2026-04-09T12:55:00Z
6
value 0.0013
scoring_system epss
scoring_elements 0.32406
published_at 2026-04-07T12:55:00Z
7
value 0.0013
scoring_system epss
scoring_elements 0.32454
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22747
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039572
reference_id 2039572
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039572
16
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
17
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
19
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:04:07Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
21
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:04:07Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
23
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:04:07Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
24
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
25
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
26
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
27
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
28
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
29
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
30
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
31
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
32
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
33
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1735028
reference_id show_bug.cgi?id=1735028
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:04:07Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1735028
35
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
36
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
37
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
38
reference_url https://usn.ubuntu.com/5506-1/
reference_id USN-5506-1
reference_type
scores
url https://usn.ubuntu.com/5506-1/
39
reference_url https://usn.ubuntu.com/5872-1/
reference_id USN-5872-1
reference_type
scores
url https://usn.ubuntu.com/5872-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
1
url pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
purl pkg:deb/debian/nss@2:3.61-1%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2tts-gwgd-zqcz
1
vulnerability VCID-3nrj-5r53-37ab
2
vulnerability VCID-46cy-x3cp-tke5
3
vulnerability VCID-paez-g9wh-mfeq
4
vulnerability VCID-vszp-vyxy-f7g7
5
vulnerability VCID-w794-gqex-83du
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.61-1%252Bdeb11u3
aliases CVE-2022-22747
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y43f-tmvr-hqas
25
url VCID-ykkw-a6a1-43fe
vulnerability_id VCID-ykkw-a6a1-43fe
summary nss: Cache side-channel variant of the Bleichenbacher attack
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12404.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12404.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12404
reference_id
reference_type
scores
0
value 0.14501
scoring_system epss
scoring_elements 0.94413
published_at 2026-04-01T12:55:00Z
1
value 0.14501
scoring_system epss
scoring_elements 0.9442
published_at 2026-04-02T12:55:00Z
2
value 0.14501
scoring_system epss
scoring_elements 0.9443
published_at 2026-04-04T12:55:00Z
3
value 0.14501
scoring_system epss
scoring_elements 0.94433
published_at 2026-04-07T12:55:00Z
4
value 0.14501
scoring_system epss
scoring_elements 0.94442
published_at 2026-04-08T12:55:00Z
5
value 0.14501
scoring_system epss
scoring_elements 0.94446
published_at 2026-04-09T12:55:00Z
6
value 0.14501
scoring_system epss
scoring_elements 0.94449
published_at 2026-04-11T12:55:00Z
7
value 0.14501
scoring_system epss
scoring_elements 0.94451
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12404
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12404
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12404
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1657913
reference_id 1657913
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1657913
5
reference_url https://access.redhat.com/errata/RHSA-2019:2237
reference_id RHSA-2019:2237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2237
6
reference_url https://usn.ubuntu.com/3850-1/
reference_id USN-3850-1
reference_type
scores
url https://usn.ubuntu.com/3850-1/
7
reference_url https://usn.ubuntu.com/3850-2/
reference_id USN-3850-2
reference_type
scores
url https://usn.ubuntu.com/3850-2/
fixed_packages
0
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
aliases CVE-2018-12404
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ykkw-a6a1-43fe
Fixing_vulnerabilities
0
url VCID-dh3c-g3k3-zkb7
vulnerability_id VCID-dh3c-g3k3-zkb7
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7805.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7805.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7805
reference_id
reference_type
scores
0
value 0.03211
scoring_system epss
scoring_elements 0.8703
published_at 2026-04-13T12:55:00Z
1
value 0.03851
scoring_system epss
scoring_elements 0.88141
published_at 2026-04-01T12:55:00Z
2
value 0.03851
scoring_system epss
scoring_elements 0.88207
published_at 2026-04-11T12:55:00Z
3
value 0.03851
scoring_system epss
scoring_elements 0.88197
published_at 2026-04-09T12:55:00Z
4
value 0.03851
scoring_system epss
scoring_elements 0.88191
published_at 2026-04-08T12:55:00Z
5
value 0.03851
scoring_system epss
scoring_elements 0.88149
published_at 2026-04-02T12:55:00Z
6
value 0.03851
scoring_system epss
scoring_elements 0.88199
published_at 2026-04-12T12:55:00Z
7
value 0.03851
scoring_system epss
scoring_elements 0.88166
published_at 2026-04-04T12:55:00Z
8
value 0.03851
scoring_system epss
scoring_elements 0.88171
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7805
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1377618
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1377618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
13
reference_url https://www.debian.org/security/2017/dsa-3987
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3987
14
reference_url https://www.debian.org/security/2017/dsa-3998
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3998
15
reference_url https://www.debian.org/security/2017/dsa-4014
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4014
16
reference_url https://www.mozilla.org/security/advisories/mfsa2017-21/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-21/
17
reference_url https://www.mozilla.org/security/advisories/mfsa2017-22/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-22/
18
reference_url https://www.mozilla.org/security/advisories/mfsa2017-23/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-23/
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
20
reference_url http://www.securityfocus.com/bid/101059
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101059
21
reference_url http://www.securitytracker.com/id/1039465
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039465
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471171
reference_id 1471171
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471171
23
reference_url https://security.archlinux.org/ASA-201710-19
reference_id ASA-201710-19
reference_type
scores
url https://security.archlinux.org/ASA-201710-19
24
reference_url https://security.archlinux.org/AVG-441
reference_id AVG-441
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-441
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:52.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:52.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:52.4.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:56.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:56.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:56.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:52.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:52.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:52.4.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7805
reference_id CVE-2017-7805
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7805
32
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
33
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
34
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
reference_id mfsa2017-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
35
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
reference_id mfsa2017-22
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
36
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
reference_id mfsa2017-23
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
37
reference_url https://access.redhat.com/errata/RHSA-2017:2832
reference_id RHSA-2017:2832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2832
38
reference_url https://usn.ubuntu.com/3431-1/
reference_id USN-3431-1
reference_type
scores
url https://usn.ubuntu.com/3431-1/
39
reference_url https://usn.ubuntu.com/3435-1/
reference_id USN-3435-1
reference_type
scores
url https://usn.ubuntu.com/3435-1/
40
reference_url https://usn.ubuntu.com/3436-1/
reference_id USN-3436-1
reference_type
scores
url https://usn.ubuntu.com/3436-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
purl pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ekxy-vaed-u7cg
8
vulnerability VCID-ewe9-39b1-kba2
9
vulnerability VCID-fgv4-bz59-h7g7
10
vulnerability VCID-gfj6-dsud-g3fh
11
vulnerability VCID-hs5f-21nx-gfeb
12
vulnerability VCID-jrsz-ynp7-wbb2
13
vulnerability VCID-jvrr-2gej-bfby
14
vulnerability VCID-k2s2-zkua-8ydy
15
vulnerability VCID-k4a4-f1as-x3bj
16
vulnerability VCID-kxvg-qw8v-vydv
17
vulnerability VCID-mx8t-s47w-wud5
18
vulnerability VCID-paez-g9wh-mfeq
19
vulnerability VCID-rk7t-zjzg-eqar
20
vulnerability VCID-szzk-wxm2-cfgj
21
vulnerability VCID-t89f-eksr-juen
22
vulnerability VCID-vjas-pry4-93cz
23
vulnerability VCID-vszp-vyxy-f7g7
24
vulnerability VCID-vzb9-aeqz-hybr
25
vulnerability VCID-w794-gqex-83du
26
vulnerability VCID-wavp-f4kn-j3cm
27
vulnerability VCID-x1ty-wqph-gkak
28
vulnerability VCID-y43f-tmvr-hqas
29
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26-1%252Bdebu8u3
1
url pkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
purl pkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ewe9-39b1-kba2
8
vulnerability VCID-fgv4-bz59-h7g7
9
vulnerability VCID-hs5f-21nx-gfeb
10
vulnerability VCID-jrsz-ynp7-wbb2
11
vulnerability VCID-jvrr-2gej-bfby
12
vulnerability VCID-k2s2-zkua-8ydy
13
vulnerability VCID-k4a4-f1as-x3bj
14
vulnerability VCID-mx8t-s47w-wud5
15
vulnerability VCID-paez-g9wh-mfeq
16
vulnerability VCID-rk7t-zjzg-eqar
17
vulnerability VCID-szzk-wxm2-cfgj
18
vulnerability VCID-vjas-pry4-93cz
19
vulnerability VCID-vszp-vyxy-f7g7
20
vulnerability VCID-vzb9-aeqz-hybr
21
vulnerability VCID-w794-gqex-83du
22
vulnerability VCID-wavp-f4kn-j3cm
23
vulnerability VCID-x1ty-wqph-gkak
24
vulnerability VCID-y43f-tmvr-hqas
25
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26.2-1.1%252Bdeb9u1
2
url pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
purl pkg:deb/debian/nss@2:3.42.1-1%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-ewe9-39b1-kba2
7
vulnerability VCID-hs5f-21nx-gfeb
8
vulnerability VCID-jrsz-ynp7-wbb2
9
vulnerability VCID-k2s2-zkua-8ydy
10
vulnerability VCID-k4a4-f1as-x3bj
11
vulnerability VCID-mx8t-s47w-wud5
12
vulnerability VCID-paez-g9wh-mfeq
13
vulnerability VCID-rk7t-zjzg-eqar
14
vulnerability VCID-szzk-wxm2-cfgj
15
vulnerability VCID-vjas-pry4-93cz
16
vulnerability VCID-vszp-vyxy-f7g7
17
vulnerability VCID-vzb9-aeqz-hybr
18
vulnerability VCID-w794-gqex-83du
19
vulnerability VCID-wavp-f4kn-j3cm
20
vulnerability VCID-x1ty-wqph-gkak
21
vulnerability VCID-y43f-tmvr-hqas
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.42.1-1%252Bdeb10u5
aliases CVE-2017-7805
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dh3c-g3k3-zkb7
1
url VCID-ekxy-vaed-u7cg
vulnerability_id VCID-ekxy-vaed-u7cg
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird the worst of which could lead to the execution of arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9074.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9074.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9074
reference_id
reference_type
scores
0
value 0.01221
scoring_system epss
scoring_elements 0.79091
published_at 2026-04-13T12:55:00Z
1
value 0.01221
scoring_system epss
scoring_elements 0.79074
published_at 2026-04-04T12:55:00Z
2
value 0.01221
scoring_system epss
scoring_elements 0.79059
published_at 2026-04-07T12:55:00Z
3
value 0.01221
scoring_system epss
scoring_elements 0.79083
published_at 2026-04-08T12:55:00Z
4
value 0.01221
scoring_system epss
scoring_elements 0.7909
published_at 2026-04-09T12:55:00Z
5
value 0.01221
scoring_system epss
scoring_elements 0.79115
published_at 2026-04-11T12:55:00Z
6
value 0.01221
scoring_system epss
scoring_elements 0.79101
published_at 2026-04-12T12:55:00Z
7
value 0.01221
scoring_system epss
scoring_elements 0.79041
published_at 2026-04-01T12:55:00Z
8
value 0.01221
scoring_system epss
scoring_elements 0.79047
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9074
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1293334
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1293334
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5290
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5291
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5296
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5297
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9064
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9066
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://www.debian.org/security/2016/dsa-3730
reference_id
reference_type
scores
url https://www.debian.org/security/2016/dsa-3730
13
reference_url https://www.mozilla.org/security/advisories/mfsa2016-89/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2016-89/
14
reference_url https://www.mozilla.org/security/advisories/mfsa2016-90/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2016-90/
15
reference_url https://www.mozilla.org/security/advisories/mfsa2016-93/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2016-93/
16
reference_url http://www.securityfocus.com/bid/94341
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/94341
17
reference_url http://www.securitytracker.com/id/1037298
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037298
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1396548
reference_id 1396548
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1396548
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-9074
reference_id CVE-2016-9074
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-9074
23
reference_url https://security.gentoo.org/glsa/201701-15
reference_id GLSA-201701-15
reference_type
scores
url https://security.gentoo.org/glsa/201701-15
24
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
25
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-89
reference_id mfsa2016-89
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-89
26
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-90
reference_id mfsa2016-90
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-90
27
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-93
reference_id mfsa2016-93
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-93
28
reference_url https://usn.ubuntu.com/3163-1/
reference_id USN-3163-1
reference_type
scores
url https://usn.ubuntu.com/3163-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
purl pkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ewe9-39b1-kba2
8
vulnerability VCID-fgv4-bz59-h7g7
9
vulnerability VCID-hs5f-21nx-gfeb
10
vulnerability VCID-jrsz-ynp7-wbb2
11
vulnerability VCID-jvrr-2gej-bfby
12
vulnerability VCID-k2s2-zkua-8ydy
13
vulnerability VCID-k4a4-f1as-x3bj
14
vulnerability VCID-mx8t-s47w-wud5
15
vulnerability VCID-paez-g9wh-mfeq
16
vulnerability VCID-rk7t-zjzg-eqar
17
vulnerability VCID-szzk-wxm2-cfgj
18
vulnerability VCID-vjas-pry4-93cz
19
vulnerability VCID-vszp-vyxy-f7g7
20
vulnerability VCID-vzb9-aeqz-hybr
21
vulnerability VCID-w794-gqex-83du
22
vulnerability VCID-wavp-f4kn-j3cm
23
vulnerability VCID-x1ty-wqph-gkak
24
vulnerability VCID-y43f-tmvr-hqas
25
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26.2-1.1%252Bdeb9u1
aliases CVE-2016-9074
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ekxy-vaed-u7cg
2
url VCID-gfj6-dsud-g3fh
vulnerability_id VCID-gfj6-dsud-g3fh
summary
Multiple vulnerabilities have been found in NSS, the worst of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5462.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5462.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5462
reference_id
reference_type
scores
0
value 0.01072
scoring_system epss
scoring_elements 0.77748
published_at 2026-04-13T12:55:00Z
1
value 0.01072
scoring_system epss
scoring_elements 0.77749
published_at 2026-04-12T12:55:00Z
2
value 0.01072
scoring_system epss
scoring_elements 0.77765
published_at 2026-04-11T12:55:00Z
3
value 0.01072
scoring_system epss
scoring_elements 0.77689
published_at 2026-04-01T12:55:00Z
4
value 0.01072
scoring_system epss
scoring_elements 0.77739
published_at 2026-04-09T12:55:00Z
5
value 0.01072
scoring_system epss
scoring_elements 0.77734
published_at 2026-04-08T12:55:00Z
6
value 0.01072
scoring_system epss
scoring_elements 0.77706
published_at 2026-04-07T12:55:00Z
7
value 0.01072
scoring_system epss
scoring_elements 0.77723
published_at 2026-04-04T12:55:00Z
8
value 0.01072
scoring_system epss
scoring_elements 0.77696
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5462
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1345089
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1345089
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5448
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7502
28
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
29
reference_url https://www.debian.org/security/2017/dsa-3831
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3831
30
reference_url https://www.debian.org/security/2017/dsa-3872
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3872
31
reference_url https://www.mozilla.org/security/advisories/mfsa2017-10/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-10/
32
reference_url https://www.mozilla.org/security/advisories/mfsa2017-11/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-11/
33
reference_url https://www.mozilla.org/security/advisories/mfsa2017-12/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-12/
34
reference_url https://www.mozilla.org/security/advisories/mfsa2017-13/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-13/
35
reference_url http://www.securityfocus.com/bid/97940
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97940
36
reference_url http://www.securitytracker.com/id/1038320
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038320
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443348
reference_id 1443348
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443348
38
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862958
reference_id 862958
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862958
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5462
reference_id CVE-2017-5462
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-5462
45
reference_url https://security.gentoo.org/glsa/201705-04
reference_id GLSA-201705-04
reference_type
scores
url https://security.gentoo.org/glsa/201705-04
46
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
47
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10
reference_id mfsa2017-10
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10
48
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-11
reference_id mfsa2017-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-11
49
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12
reference_id mfsa2017-12
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12
50
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13
reference_id mfsa2017-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13
51
reference_url https://usn.ubuntu.com/3260-1/
reference_id USN-3260-1
reference_type
scores
url https://usn.ubuntu.com/3260-1/
52
reference_url https://usn.ubuntu.com/3278-1/
reference_id USN-3278-1
reference_type
scores
url https://usn.ubuntu.com/3278-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
purl pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ekxy-vaed-u7cg
8
vulnerability VCID-ewe9-39b1-kba2
9
vulnerability VCID-fgv4-bz59-h7g7
10
vulnerability VCID-gfj6-dsud-g3fh
11
vulnerability VCID-hs5f-21nx-gfeb
12
vulnerability VCID-jrsz-ynp7-wbb2
13
vulnerability VCID-jvrr-2gej-bfby
14
vulnerability VCID-k2s2-zkua-8ydy
15
vulnerability VCID-k4a4-f1as-x3bj
16
vulnerability VCID-kxvg-qw8v-vydv
17
vulnerability VCID-mx8t-s47w-wud5
18
vulnerability VCID-paez-g9wh-mfeq
19
vulnerability VCID-rk7t-zjzg-eqar
20
vulnerability VCID-szzk-wxm2-cfgj
21
vulnerability VCID-t89f-eksr-juen
22
vulnerability VCID-vjas-pry4-93cz
23
vulnerability VCID-vszp-vyxy-f7g7
24
vulnerability VCID-vzb9-aeqz-hybr
25
vulnerability VCID-w794-gqex-83du
26
vulnerability VCID-wavp-f4kn-j3cm
27
vulnerability VCID-x1ty-wqph-gkak
28
vulnerability VCID-y43f-tmvr-hqas
29
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26-1%252Bdebu8u3
1
url pkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
purl pkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ewe9-39b1-kba2
8
vulnerability VCID-fgv4-bz59-h7g7
9
vulnerability VCID-hs5f-21nx-gfeb
10
vulnerability VCID-jrsz-ynp7-wbb2
11
vulnerability VCID-jvrr-2gej-bfby
12
vulnerability VCID-k2s2-zkua-8ydy
13
vulnerability VCID-k4a4-f1as-x3bj
14
vulnerability VCID-mx8t-s47w-wud5
15
vulnerability VCID-paez-g9wh-mfeq
16
vulnerability VCID-rk7t-zjzg-eqar
17
vulnerability VCID-szzk-wxm2-cfgj
18
vulnerability VCID-vjas-pry4-93cz
19
vulnerability VCID-vszp-vyxy-f7g7
20
vulnerability VCID-vzb9-aeqz-hybr
21
vulnerability VCID-w794-gqex-83du
22
vulnerability VCID-wavp-f4kn-j3cm
23
vulnerability VCID-x1ty-wqph-gkak
24
vulnerability VCID-y43f-tmvr-hqas
25
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26.2-1.1%252Bdeb9u1
aliases CVE-2017-5462
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gfj6-dsud-g3fh
3
url VCID-kxvg-qw8v-vydv
vulnerability_id VCID-kxvg-qw8v-vydv
summary
Multiple vulnerabilities have been found in NSS, the worst of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5461.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5461.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5461
reference_id
reference_type
scores
0
value 0.00925
scoring_system epss
scoring_elements 0.76015
published_at 2026-04-13T12:55:00Z
1
value 0.00925
scoring_system epss
scoring_elements 0.76021
published_at 2026-04-12T12:55:00Z
2
value 0.00925
scoring_system epss
scoring_elements 0.76044
published_at 2026-04-11T12:55:00Z
3
value 0.00925
scoring_system epss
scoring_elements 0.75956
published_at 2026-04-01T12:55:00Z
4
value 0.00925
scoring_system epss
scoring_elements 0.75992
published_at 2026-04-04T12:55:00Z
5
value 0.00925
scoring_system epss
scoring_elements 0.76004
published_at 2026-04-08T12:55:00Z
6
value 0.00925
scoring_system epss
scoring_elements 0.75971
published_at 2026-04-07T12:55:00Z
7
value 0.00925
scoring_system epss
scoring_elements 0.75959
published_at 2026-04-02T12:55:00Z
8
value 0.00925
scoring_system epss
scoring_elements 0.76019
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5461
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1344380
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1344380
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5448
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7502
28
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.4_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.4_release_notes
29
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.28.4_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.28.4_release_notes
30
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.29.5_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.29.5_release_notes
31
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.30.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.30.1_release_notes
32
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
33
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/#CVE-2017-5461
reference_id
reference_type
scores
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/#CVE-2017-5461
34
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-11/#CVE-2017-5461
reference_id
reference_type
scores
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-11/#CVE-2017-5461
35
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12/#CVE-2017-5461
reference_id
reference_type
scores
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12/#CVE-2017-5461
36
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13/#CVE-2017-5461
reference_id
reference_type
scores
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13/#CVE-2017-5461
37
reference_url https://www.oracle.com//security-alerts/cpujul2021.html
reference_id
reference_type
scores
url https://www.oracle.com//security-alerts/cpujul2021.html
38
reference_url http://www.debian.org/security/2017/dsa-3831
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3831
39
reference_url http://www.debian.org/security/2017/dsa-3872
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3872
40
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
41
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
42
reference_url http://www.securityfocus.com/bid/98050
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/98050
43
reference_url http://www.securitytracker.com/id/1038320
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038320
44
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1440080
reference_id 1440080
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1440080
45
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862958
reference_id 862958
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862958
46
reference_url https://security.archlinux.org/ASA-201704-4
reference_id ASA-201704-4
reference_type
scores
url https://security.archlinux.org/ASA-201704-4
47
reference_url https://security.archlinux.org/ASA-201704-6
reference_id ASA-201704-6
reference_type
scores
url https://security.archlinux.org/ASA-201704-6
48
reference_url https://security.archlinux.org/ASA-201705-21
reference_id ASA-201705-21
reference_type
scores
url https://security.archlinux.org/ASA-201705-21
49
reference_url https://security.archlinux.org/AVG-247
reference_id AVG-247
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-247
50
reference_url https://security.archlinux.org/AVG-248
reference_id AVG-248
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-248
51
reference_url https://security.archlinux.org/AVG-249
reference_id AVG-249
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-249
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5461
reference_id CVE-2017-5461
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-5461
54
reference_url https://security.gentoo.org/glsa/201705-04
reference_id GLSA-201705-04
reference_type
scores
url https://security.gentoo.org/glsa/201705-04
55
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10
reference_id mfsa2017-10
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10
57
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-11
reference_id mfsa2017-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-11
58
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12
reference_id mfsa2017-12
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12
59
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13
reference_id mfsa2017-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13
60
reference_url https://access.redhat.com/errata/RHSA-2017:1100
reference_id RHSA-2017:1100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1100
61
reference_url https://access.redhat.com/errata/RHSA-2017:1101
reference_id RHSA-2017:1101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1101
62
reference_url https://access.redhat.com/errata/RHSA-2017:1102
reference_id RHSA-2017:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1102
63
reference_url https://access.redhat.com/errata/RHSA-2017:1103
reference_id RHSA-2017:1103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1103
64
reference_url https://usn.ubuntu.com/3260-1/
reference_id USN-3260-1
reference_type
scores
url https://usn.ubuntu.com/3260-1/
65
reference_url https://usn.ubuntu.com/3270-1/
reference_id USN-3270-1
reference_type
scores
url https://usn.ubuntu.com/3270-1/
66
reference_url https://usn.ubuntu.com/3278-1/
reference_id USN-3278-1
reference_type
scores
url https://usn.ubuntu.com/3278-1/
67
reference_url https://usn.ubuntu.com/3372-1/
reference_id USN-3372-1
reference_type
scores
url https://usn.ubuntu.com/3372-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
purl pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ekxy-vaed-u7cg
8
vulnerability VCID-ewe9-39b1-kba2
9
vulnerability VCID-fgv4-bz59-h7g7
10
vulnerability VCID-gfj6-dsud-g3fh
11
vulnerability VCID-hs5f-21nx-gfeb
12
vulnerability VCID-jrsz-ynp7-wbb2
13
vulnerability VCID-jvrr-2gej-bfby
14
vulnerability VCID-k2s2-zkua-8ydy
15
vulnerability VCID-k4a4-f1as-x3bj
16
vulnerability VCID-kxvg-qw8v-vydv
17
vulnerability VCID-mx8t-s47w-wud5
18
vulnerability VCID-paez-g9wh-mfeq
19
vulnerability VCID-rk7t-zjzg-eqar
20
vulnerability VCID-szzk-wxm2-cfgj
21
vulnerability VCID-t89f-eksr-juen
22
vulnerability VCID-vjas-pry4-93cz
23
vulnerability VCID-vszp-vyxy-f7g7
24
vulnerability VCID-vzb9-aeqz-hybr
25
vulnerability VCID-w794-gqex-83du
26
vulnerability VCID-wavp-f4kn-j3cm
27
vulnerability VCID-x1ty-wqph-gkak
28
vulnerability VCID-y43f-tmvr-hqas
29
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26-1%252Bdebu8u3
1
url pkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
purl pkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ewe9-39b1-kba2
8
vulnerability VCID-fgv4-bz59-h7g7
9
vulnerability VCID-hs5f-21nx-gfeb
10
vulnerability VCID-jrsz-ynp7-wbb2
11
vulnerability VCID-jvrr-2gej-bfby
12
vulnerability VCID-k2s2-zkua-8ydy
13
vulnerability VCID-k4a4-f1as-x3bj
14
vulnerability VCID-mx8t-s47w-wud5
15
vulnerability VCID-paez-g9wh-mfeq
16
vulnerability VCID-rk7t-zjzg-eqar
17
vulnerability VCID-szzk-wxm2-cfgj
18
vulnerability VCID-vjas-pry4-93cz
19
vulnerability VCID-vszp-vyxy-f7g7
20
vulnerability VCID-vzb9-aeqz-hybr
21
vulnerability VCID-w794-gqex-83du
22
vulnerability VCID-wavp-f4kn-j3cm
23
vulnerability VCID-x1ty-wqph-gkak
24
vulnerability VCID-y43f-tmvr-hqas
25
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26.2-1.1%252Bdeb9u1
aliases CVE-2017-5461
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kxvg-qw8v-vydv
4
url VCID-t89f-eksr-juen
vulnerability_id VCID-t89f-eksr-juen
summary nss: Null pointer dereference when handling empty SSLv2 messages
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7502.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7502
reference_id
reference_type
scores
0
value 0.02085
scoring_system epss
scoring_elements 0.8394
published_at 2026-04-01T12:55:00Z
1
value 0.02085
scoring_system epss
scoring_elements 0.83972
published_at 2026-04-07T12:55:00Z
2
value 0.02085
scoring_system epss
scoring_elements 0.84002
published_at 2026-04-09T12:55:00Z
3
value 0.02085
scoring_system epss
scoring_elements 0.84017
published_at 2026-04-11T12:55:00Z
4
value 0.02085
scoring_system epss
scoring_elements 0.84011
published_at 2026-04-12T12:55:00Z
5
value 0.02085
scoring_system epss
scoring_elements 0.83954
published_at 2026-04-02T12:55:00Z
6
value 0.02085
scoring_system epss
scoring_elements 0.8397
published_at 2026-04-04T12:55:00Z
7
value 0.02085
scoring_system epss
scoring_elements 0.83995
published_at 2026-04-08T12:55:00Z
8
value 0.02098
scoring_system epss
scoring_elements 0.84048
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7502
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1446631
reference_id 1446631
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1446631
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863839
reference_id 863839
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863839
8
reference_url https://access.redhat.com/errata/RHSA-2017:1364
reference_id RHSA-2017:1364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1364
9
reference_url https://access.redhat.com/errata/RHSA-2017:1365
reference_id RHSA-2017:1365
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1365
10
reference_url https://access.redhat.com/errata/RHSA-2017:1567
reference_id RHSA-2017:1567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1567
11
reference_url https://usn.ubuntu.com/3336-1/
reference_id USN-3336-1
reference_type
scores
url https://usn.ubuntu.com/3336-1/
12
reference_url https://usn.ubuntu.com/3372-1/
reference_id USN-3372-1
reference_type
scores
url https://usn.ubuntu.com/3372-1/
fixed_packages
0
url pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
purl pkg:deb/debian/nss@2:3.26-1%2Bdebu8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ekxy-vaed-u7cg
8
vulnerability VCID-ewe9-39b1-kba2
9
vulnerability VCID-fgv4-bz59-h7g7
10
vulnerability VCID-gfj6-dsud-g3fh
11
vulnerability VCID-hs5f-21nx-gfeb
12
vulnerability VCID-jrsz-ynp7-wbb2
13
vulnerability VCID-jvrr-2gej-bfby
14
vulnerability VCID-k2s2-zkua-8ydy
15
vulnerability VCID-k4a4-f1as-x3bj
16
vulnerability VCID-kxvg-qw8v-vydv
17
vulnerability VCID-mx8t-s47w-wud5
18
vulnerability VCID-paez-g9wh-mfeq
19
vulnerability VCID-rk7t-zjzg-eqar
20
vulnerability VCID-szzk-wxm2-cfgj
21
vulnerability VCID-t89f-eksr-juen
22
vulnerability VCID-vjas-pry4-93cz
23
vulnerability VCID-vszp-vyxy-f7g7
24
vulnerability VCID-vzb9-aeqz-hybr
25
vulnerability VCID-w794-gqex-83du
26
vulnerability VCID-wavp-f4kn-j3cm
27
vulnerability VCID-x1ty-wqph-gkak
28
vulnerability VCID-y43f-tmvr-hqas
29
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26-1%252Bdebu8u3
1
url pkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
purl pkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2zrv-q4tb-wqeg
1
vulnerability VCID-46cy-x3cp-tke5
2
vulnerability VCID-6fvj-phnx-kfgs
3
vulnerability VCID-7msj-wyd6-zkbe
4
vulnerability VCID-8qtg-h4km-bfg2
5
vulnerability VCID-cgvg-aj53-kkbp
6
vulnerability VCID-dh3c-g3k3-zkb7
7
vulnerability VCID-ewe9-39b1-kba2
8
vulnerability VCID-fgv4-bz59-h7g7
9
vulnerability VCID-hs5f-21nx-gfeb
10
vulnerability VCID-jrsz-ynp7-wbb2
11
vulnerability VCID-jvrr-2gej-bfby
12
vulnerability VCID-k2s2-zkua-8ydy
13
vulnerability VCID-k4a4-f1as-x3bj
14
vulnerability VCID-mx8t-s47w-wud5
15
vulnerability VCID-paez-g9wh-mfeq
16
vulnerability VCID-rk7t-zjzg-eqar
17
vulnerability VCID-szzk-wxm2-cfgj
18
vulnerability VCID-vjas-pry4-93cz
19
vulnerability VCID-vszp-vyxy-f7g7
20
vulnerability VCID-vzb9-aeqz-hybr
21
vulnerability VCID-w794-gqex-83du
22
vulnerability VCID-wavp-f4kn-j3cm
23
vulnerability VCID-x1ty-wqph-gkak
24
vulnerability VCID-y43f-tmvr-hqas
25
vulnerability VCID-ykkw-a6a1-43fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26.2-1.1%252Bdeb9u1
aliases CVE-2017-7502
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t89f-eksr-juen
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/nss@2:3.26.2-1.1%252Bdeb9u1