{"url":"http://public2.vulnerablecode.io/api/packages/108302?format=json","purl":"pkg:rpm/redhat/firefox@60.1.0-5?arch=el6","type":"rpm","namespace":"redhat","name":"firefox","version":"60.1.0-5","qualifiers":{"arch":"el6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60703?format=json","vulnerability_id":"VCID-89t2-wzrw-nycq","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12362.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12362.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12362","reference_id":"","reference_type":"","scores":[{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83277","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83241","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83245","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83251","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83175","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83235","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83228","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83204","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83205","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83191","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02984","scoring_system":"epss","scoring_elements":"0.86635","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02984","scoring_system":"epss","scoring_elements":"0.86593","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02984","scoring_system":"epss","scoring_elements":"0.86611","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02984","scoring_system":"epss","scoring_elements":"0.86628","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02984","scoring_system":"epss","scoring_elements":"0.86623","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03139","scoring_system":"epss","scoring_elements":"0.86918","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03139","scoring_system":"epss","scoring_elements":"0.86927","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03139","scoring_system":"epss","scoring_elements":"0.86923","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03139","scoring_system":"epss","scoring_elements":"0.869","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03139","scoring_system":"epss","scoring_elements":"0.86901","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1595027","reference_id":"1595027","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1595027"},{"reference_url":"https://security.archlinux.org/ASA-201806-14","reference_id":"ASA-201806-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201806-14"},{"reference_url":"https://security.archlinux.org/ASA-201807-4","reference_id":"ASA-201807-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201807-4"},{"reference_url":"https://security.archlinux.org/AVG-727","reference_id":"AVG-727","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-727"},{"reference_url":"https://security.archlinux.org/AVG-728","reference_id":"AVG-728","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-728"},{"reference_url":"https://security.gentoo.org/glsa/201811-13","reference_id":"GLSA-201811-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-15","reference_id":"mfsa2018-15","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-16","reference_id":"mfsa2018-16","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-16"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-17","reference_id":"mfsa2018-17","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-17"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-18","reference_id":"mfsa2018-18","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-19","reference_id":"mfsa2018-19","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2112","reference_id":"RHSA-2018:2112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2113","reference_id":"RHSA-2018:2113","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2251","reference_id":"RHSA-2018:2251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2251"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2252","reference_id":"RHSA-2018:2252","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2252"},{"reference_url":"https://usn.ubuntu.com/3705-1/","reference_id":"USN-3705-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3705-1/"},{"reference_url":"https://usn.ubuntu.com/3714-1/","reference_id":"USN-3714-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3714-1/"}],"fixed_packages":[],"aliases":["CVE-2018-12362"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-89t2-wzrw-nycq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60701?format=json","vulnerability_id":"VCID-a79m-8sp3-v3dh","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12360.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12360.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12360","reference_id":"","reference_type":"","scores":[{"value":"0.02012","scoring_system":"epss","scoring_elements":"0.83738","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02012","scoring_system":"epss","scoring_elements":"0.83703","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02012","scoring_system":"epss","scoring_elements":"0.83708","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02012","scoring_system":"epss","scoring_elements":"0.83714","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02012","scoring_system":"epss","scoring_elements":"0.83638","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02012","scoring_system":"epss","scoring_elements":"0.83698","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02012","scoring_system":"epss","scoring_elements":"0.83691","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02012","scoring_system":"epss","scoring_elements":"0.83667","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02012","scoring_system":"epss","scoring_elements":"0.83665","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02012","scoring_system":"epss","scoring_elements":"0.83651","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03153","scoring_system":"epss","scoring_elements":"0.87014","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03153","scoring_system":"epss","scoring_elements":"0.8697","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03153","scoring_system":"epss","scoring_elements":"0.86988","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03153","scoring_system":"epss","scoring_elements":"0.87005","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03153","scoring_system":"epss","scoring_elements":"0.87","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03316","scoring_system":"epss","scoring_elements":"0.87293","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03316","scoring_system":"epss","scoring_elements":"0.87302","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03316","scoring_system":"epss","scoring_elements":"0.87299","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03316","scoring_system":"epss","scoring_elements":"0.87281","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03316","scoring_system":"epss","scoring_elements":"0.87275","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1595025","reference_id":"1595025","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1595025"},{"reference_url":"https://security.archlinux.org/ASA-201806-14","reference_id":"ASA-201806-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201806-14"},{"reference_url":"https://security.archlinux.org/ASA-201807-4","reference_id":"ASA-201807-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201807-4"},{"reference_url":"https://security.archlinux.org/AVG-727","reference_id":"AVG-727","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-727"},{"reference_url":"https://security.archlinux.org/AVG-728","reference_id":"AVG-728","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-728"},{"reference_url":"https://security.gentoo.org/glsa/201811-13","reference_id":"GLSA-201811-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-15","reference_id":"mfsa2018-15","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-16","reference_id":"mfsa2018-16","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-16"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-17","reference_id":"mfsa2018-17","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-17"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-18","reference_id":"mfsa2018-18","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-19","reference_id":"mfsa2018-19","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2112","reference_id":"RHSA-2018:2112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2113","reference_id":"RHSA-2018:2113","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2251","reference_id":"RHSA-2018:2251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2251"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2252","reference_id":"RHSA-2018:2252","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2252"},{"reference_url":"https://usn.ubuntu.com/3705-1/","reference_id":"USN-3705-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3705-1/"},{"reference_url":"https://usn.ubuntu.com/3714-1/","reference_id":"USN-3714-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3714-1/"}],"fixed_packages":[],"aliases":["CVE-2018-12360"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a79m-8sp3-v3dh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60731?format=json","vulnerability_id":"VCID-adfd-zkn8-3fgd","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5156.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5156.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5156","reference_id":"","reference_type":"","scores":[{"value":"0.02953","scoring_system":"epss","scoring_elements":"0.86528","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02953","scoring_system":"epss","scoring_elements":"0.86561","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02953","scoring_system":"epss","scoring_elements":"0.86565","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02953","scoring_system":"epss","scoring_elements":"0.86573","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02953","scoring_system":"epss","scoring_elements":"0.86547","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03107","scoring_system":"epss","scoring_elements":"0.86812","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03107","scoring_system":"epss","scoring_elements":"0.86825","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03107","scoring_system":"epss","scoring_elements":"0.86756","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03107","scoring_system":"epss","scoring_elements":"0.86767","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03107","scoring_system":"epss","scoring_elements":"0.86786","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03107","scoring_system":"epss","scoring_elements":"0.86783","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03107","scoring_system":"epss","scoring_elements":"0.86803","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03107","scoring_system":"epss","scoring_elements":"0.86817","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03107","scoring_system":"epss","scoring_elements":"0.86833","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03107","scoring_system":"epss","scoring_elements":"0.86837","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03107","scoring_system":"epss","scoring_elements":"0.86836","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03107","scoring_system":"epss","scoring_elements":"0.86853","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03107","scoring_system":"epss","scoring_elements":"0.8686","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03107","scoring_system":"epss","scoring_elements":"0.86822","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5156"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1595037","reference_id":"1595037","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1595037"},{"reference_url":"https://security.archlinux.org/ASA-201808-8","reference_id":"ASA-201808-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201808-8"},{"reference_url":"https://security.archlinux.org/AVG-751","reference_id":"AVG-751","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-751"},{"reference_url":"https://security.gentoo.org/glsa/201811-13","reference_id":"GLSA-201811-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-15","reference_id":"mfsa2018-15","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-16","reference_id":"mfsa2018-16","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-16"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-17","reference_id":"mfsa2018-17","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-17"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-19","reference_id":"mfsa2018-19","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2112","reference_id":"RHSA-2018:2112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2113","reference_id":"RHSA-2018:2113","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2113"},{"reference_url":"https://usn.ubuntu.com/3705-1/","reference_id":"USN-3705-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3705-1/"}],"fixed_packages":[],"aliases":["CVE-2018-5156"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-adfd-zkn8-3fgd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60706?format=json","vulnerability_id":"VCID-bfdm-fkfv-nfch","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12365.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12365.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12365","reference_id":"","reference_type":"","scores":[{"value":"0.01951","scoring_system":"epss","scoring_elements":"0.83615","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01951","scoring_system":"epss","scoring_elements":"0.83599","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01951","scoring_system":"epss","scoring_elements":"0.8358","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01951","scoring_system":"epss","scoring_elements":"0.83559","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02054","scoring_system":"epss","scoring_elements":"0.83869","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02054","scoring_system":"epss","scoring_elements":"0.83815","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02054","scoring_system":"epss","scoring_elements":"0.83875","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02054","scoring_system":"epss","scoring_elements":"0.83892","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02054","scoring_system":"epss","scoring_elements":"0.83885","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02054","scoring_system":"epss","scoring_elements":"0.83881","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02054","scoring_system":"epss","scoring_elements":"0.83915","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02054","scoring_system":"epss","scoring_elements":"0.8394","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02054","scoring_system":"epss","scoring_elements":"0.83948","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02054","scoring_system":"epss","scoring_elements":"0.83953","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02054","scoring_system":"epss","scoring_elements":"0.83828","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02054","scoring_system":"epss","scoring_elements":"0.83844","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02054","scoring_system":"epss","scoring_elements":"0.83846","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1595030","reference_id":"1595030","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1595030"},{"reference_url":"https://security.archlinux.org/ASA-201806-14","reference_id":"ASA-201806-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201806-14"},{"reference_url":"https://security.archlinux.org/ASA-201807-4","reference_id":"ASA-201807-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201807-4"},{"reference_url":"https://security.archlinux.org/AVG-727","reference_id":"AVG-727","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-727"},{"reference_url":"https://security.archlinux.org/AVG-728","reference_id":"AVG-728","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-728"},{"reference_url":"https://security.gentoo.org/glsa/201811-13","reference_id":"GLSA-201811-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-15","reference_id":"mfsa2018-15","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-16","reference_id":"mfsa2018-16","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-16"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-17","reference_id":"mfsa2018-17","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-17"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-18","reference_id":"mfsa2018-18","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-19","reference_id":"mfsa2018-19","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2112","reference_id":"RHSA-2018:2112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2113","reference_id":"RHSA-2018:2113","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2251","reference_id":"RHSA-2018:2251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2251"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2252","reference_id":"RHSA-2018:2252","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2252"},{"reference_url":"https://usn.ubuntu.com/3705-1/","reference_id":"USN-3705-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3705-1/"},{"reference_url":"https://usn.ubuntu.com/3714-1/","reference_id":"USN-3714-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3714-1/"}],"fixed_packages":[],"aliases":["CVE-2018-12365"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bfdm-fkfv-nfch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60743?format=json","vulnerability_id":"VCID-csm4-qspw-83da","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5188.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5188.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5188","reference_id":"","reference_type":"","scores":[{"value":"0.03029","scoring_system":"epss","scoring_elements":"0.86662","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03029","scoring_system":"epss","scoring_elements":"0.86649","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03029","scoring_system":"epss","scoring_elements":"0.86656","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03029","scoring_system":"epss","scoring_elements":"0.86658","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03029","scoring_system":"epss","scoring_elements":"0.86586","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03029","scoring_system":"epss","scoring_elements":"0.86644","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03029","scoring_system":"epss","scoring_elements":"0.86635","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03029","scoring_system":"epss","scoring_elements":"0.86596","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03029","scoring_system":"epss","scoring_elements":"0.86615","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04709","scoring_system":"epss","scoring_elements":"0.89455","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04709","scoring_system":"epss","scoring_elements":"0.89414","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04709","scoring_system":"epss","scoring_elements":"0.89432","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04709","scoring_system":"epss","scoring_elements":"0.89445","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04947","scoring_system":"epss","scoring_elements":"0.89674","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04947","scoring_system":"epss","scoring_elements":"0.89676","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04947","scoring_system":"epss","scoring_elements":"0.89665","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04947","scoring_system":"epss","scoring_elements":"0.89658","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1595040","reference_id":"1595040","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1595040"},{"reference_url":"https://security.archlinux.org/ASA-201806-14","reference_id":"ASA-201806-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201806-14"},{"reference_url":"https://security.archlinux.org/ASA-201807-4","reference_id":"ASA-201807-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201807-4"},{"reference_url":"https://security.archlinux.org/AVG-727","reference_id":"AVG-727","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-727"},{"reference_url":"https://security.archlinux.org/AVG-728","reference_id":"AVG-728","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-728"},{"reference_url":"https://security.gentoo.org/glsa/201811-13","reference_id":"GLSA-201811-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-15","reference_id":"mfsa2018-15","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-16","reference_id":"mfsa2018-16","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-16"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-17","reference_id":"mfsa2018-17","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-17"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-18","reference_id":"mfsa2018-18","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-19","reference_id":"mfsa2018-19","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2112","reference_id":"RHSA-2018:2112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2113","reference_id":"RHSA-2018:2113","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2251","reference_id":"RHSA-2018:2251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2251"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2252","reference_id":"RHSA-2018:2252","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2252"},{"reference_url":"https://usn.ubuntu.com/3705-1/","reference_id":"USN-3705-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3705-1/"},{"reference_url":"https://usn.ubuntu.com/3714-1/","reference_id":"USN-3714-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3714-1/"},{"reference_url":"https://usn.ubuntu.com/3749-1/","reference_id":"USN-3749-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3749-1/"}],"fixed_packages":[],"aliases":["CVE-2018-5188"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-csm4-qspw-83da"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60707?format=json","vulnerability_id":"VCID-j7j8-g9du-mqfz","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12366.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12366.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12366","reference_id":"","reference_type":"","scores":[{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.77377","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.77319","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.77359","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.7737","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.77348","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77766","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77716","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77792","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77776","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77812","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77805","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77837","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77846","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.7786","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77722","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77749","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77733","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77761","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1595031","reference_id":"1595031","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1595031"},{"reference_url":"https://security.archlinux.org/ASA-201806-14","reference_id":"ASA-201806-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201806-14"},{"reference_url":"https://security.archlinux.org/ASA-201807-4","reference_id":"ASA-201807-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201807-4"},{"reference_url":"https://security.archlinux.org/AVG-727","reference_id":"AVG-727","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-727"},{"reference_url":"https://security.archlinux.org/AVG-728","reference_id":"AVG-728","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-728"},{"reference_url":"https://security.gentoo.org/glsa/201811-13","reference_id":"GLSA-201811-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-15","reference_id":"mfsa2018-15","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-16","reference_id":"mfsa2018-16","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-16"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-17","reference_id":"mfsa2018-17","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-17"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-18","reference_id":"mfsa2018-18","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-19","reference_id":"mfsa2018-19","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2112","reference_id":"RHSA-2018:2112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2113","reference_id":"RHSA-2018:2113","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2251","reference_id":"RHSA-2018:2251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2251"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2252","reference_id":"RHSA-2018:2252","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2252"},{"reference_url":"https://usn.ubuntu.com/3705-1/","reference_id":"USN-3705-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3705-1/"},{"reference_url":"https://usn.ubuntu.com/3714-1/","reference_id":"USN-3714-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3714-1/"}],"fixed_packages":[],"aliases":["CVE-2018-12366"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j7j8-g9du-mqfz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62888?format=json","vulnerability_id":"VCID-jvkp-8vex-4yby","summary":"When entered directly, Reader Mode did not strip the username and password section of URLs displayed in the addressbar. This can be used for spoofing the domain of the current page.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7762.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7762.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7762","reference_id":"","reference_type":"","scores":[{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67531","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67717","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67641","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67684","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67721","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67692","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67567","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67589","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67618","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67632","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67654","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.6764","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67608","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67642","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67633","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67653","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67664","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67666","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7762"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1358248","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1358248"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2017-15/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2017-15/"},{"reference_url":"http://www.securityfocus.com/bid/99047","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/99047"},{"reference_url":"http://www.securitytracker.com/id/1038689","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1038689"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1590493","reference_id":"1590493","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1590493"},{"reference_url":"https://security.archlinux.org/ASA-201706-19","reference_id":"ASA-201706-19","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-19"},{"reference_url":"https://security.archlinux.org/AVG-302","reference_id":"AVG-302","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-302"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7762","reference_id":"CVE-2017-7762","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7762"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2017-15","reference_id":"mfsa2017-15","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2017-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2112","reference_id":"RHSA-2018:2112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2113","reference_id":"RHSA-2018:2113","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2113"},{"reference_url":"https://usn.ubuntu.com/3315-1/","reference_id":"USN-3315-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3315-1/"}],"fixed_packages":[],"aliases":["CVE-2017-7762"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jvkp-8vex-4yby"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60705?format=json","vulnerability_id":"VCID-sr45-86k8-8ybs","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12364.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12364.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12364","reference_id":"","reference_type":"","scores":[{"value":"0.02537","scoring_system":"epss","scoring_elements":"0.85577","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02537","scoring_system":"epss","scoring_elements":"0.85526","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02537","scoring_system":"epss","scoring_elements":"0.85564","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02537","scoring_system":"epss","scoring_elements":"0.85568","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02537","scoring_system":"epss","scoring_elements":"0.85549","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0267","scoring_system":"epss","scoring_elements":"0.85804","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0267","scoring_system":"epss","scoring_elements":"0.85737","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0267","scoring_system":"epss","scoring_elements":"0.85815","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0267","scoring_system":"epss","scoring_elements":"0.85811","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0267","scoring_system":"epss","scoring_elements":"0.8583","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0267","scoring_system":"epss","scoring_elements":"0.85834","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0267","scoring_system":"epss","scoring_elements":"0.85828","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0267","scoring_system":"epss","scoring_elements":"0.85851","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0267","scoring_system":"epss","scoring_elements":"0.85861","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0267","scoring_system":"epss","scoring_elements":"0.85862","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0267","scoring_system":"epss","scoring_elements":"0.85749","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0267","scoring_system":"epss","scoring_elements":"0.85768","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0267","scoring_system":"epss","scoring_elements":"0.85774","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0267","scoring_system":"epss","scoring_elements":"0.85793","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0267","scoring_system":"epss","scoring_elements":"0.85818","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1595029","reference_id":"1595029","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1595029"},{"reference_url":"https://security.archlinux.org/ASA-201806-14","reference_id":"ASA-201806-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201806-14"},{"reference_url":"https://security.archlinux.org/ASA-201807-4","reference_id":"ASA-201807-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201807-4"},{"reference_url":"https://security.archlinux.org/AVG-727","reference_id":"AVG-727","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-727"},{"reference_url":"https://security.archlinux.org/AVG-728","reference_id":"AVG-728","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-728"},{"reference_url":"https://security.gentoo.org/glsa/201811-13","reference_id":"GLSA-201811-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-15","reference_id":"mfsa2018-15","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-16","reference_id":"mfsa2018-16","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-16"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-17","reference_id":"mfsa2018-17","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-17"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-18","reference_id":"mfsa2018-18","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-19","reference_id":"mfsa2018-19","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2112","reference_id":"RHSA-2018:2112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2113","reference_id":"RHSA-2018:2113","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2251","reference_id":"RHSA-2018:2251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2251"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2252","reference_id":"RHSA-2018:2252","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2252"},{"reference_url":"https://usn.ubuntu.com/3705-1/","reference_id":"USN-3705-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3705-1/"},{"reference_url":"https://usn.ubuntu.com/3714-1/","reference_id":"USN-3714-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3714-1/"}],"fixed_packages":[],"aliases":["CVE-2018-12364"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sr45-86k8-8ybs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60704?format=json","vulnerability_id":"VCID-u23v-7afk-qben","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12363.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12363.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12363","reference_id":"","reference_type":"","scores":[{"value":"0.02435","scoring_system":"epss","scoring_elements":"0.85281","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02435","scoring_system":"epss","scoring_elements":"0.85227","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02435","scoring_system":"epss","scoring_elements":"0.85267","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02435","scoring_system":"epss","scoring_elements":"0.85272","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02435","scoring_system":"epss","scoring_elements":"0.85253","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02562","scoring_system":"epss","scoring_elements":"0.85511","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02562","scoring_system":"epss","scoring_elements":"0.85449","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02562","scoring_system":"epss","scoring_elements":"0.85523","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02562","scoring_system":"epss","scoring_elements":"0.8552","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02562","scoring_system":"epss","scoring_elements":"0.85543","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02562","scoring_system":"epss","scoring_elements":"0.85548","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02562","scoring_system":"epss","scoring_elements":"0.85544","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02562","scoring_system":"epss","scoring_elements":"0.85566","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02562","scoring_system":"epss","scoring_elements":"0.85576","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02562","scoring_system":"epss","scoring_elements":"0.85574","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02562","scoring_system":"epss","scoring_elements":"0.85462","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02562","scoring_system":"epss","scoring_elements":"0.85479","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02562","scoring_system":"epss","scoring_elements":"0.85482","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02562","scoring_system":"epss","scoring_elements":"0.85502","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02562","scoring_system":"epss","scoring_elements":"0.85525","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1595028","reference_id":"1595028","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1595028"},{"reference_url":"https://security.archlinux.org/ASA-201806-14","reference_id":"ASA-201806-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201806-14"},{"reference_url":"https://security.archlinux.org/ASA-201807-4","reference_id":"ASA-201807-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201807-4"},{"reference_url":"https://security.archlinux.org/AVG-727","reference_id":"AVG-727","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-727"},{"reference_url":"https://security.archlinux.org/AVG-728","reference_id":"AVG-728","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-728"},{"reference_url":"https://security.gentoo.org/glsa/201811-13","reference_id":"GLSA-201811-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-15","reference_id":"mfsa2018-15","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-16","reference_id":"mfsa2018-16","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-16"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-17","reference_id":"mfsa2018-17","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-17"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-18","reference_id":"mfsa2018-18","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-19","reference_id":"mfsa2018-19","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2112","reference_id":"RHSA-2018:2112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2113","reference_id":"RHSA-2018:2113","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2251","reference_id":"RHSA-2018:2251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2251"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2252","reference_id":"RHSA-2018:2252","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2252"},{"reference_url":"https://usn.ubuntu.com/3705-1/","reference_id":"USN-3705-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3705-1/"},{"reference_url":"https://usn.ubuntu.com/3714-1/","reference_id":"USN-3714-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3714-1/"}],"fixed_packages":[],"aliases":["CVE-2018-12363"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u23v-7afk-qben"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60700?format=json","vulnerability_id":"VCID-ym7a-e9b5-5ygm","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12359.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12359.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12359","reference_id":"","reference_type":"","scores":[{"value":"0.03167","scoring_system":"epss","scoring_elements":"0.86948","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03167","scoring_system":"epss","scoring_elements":"0.86933","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03167","scoring_system":"epss","scoring_elements":"0.86939","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03167","scoring_system":"epss","scoring_elements":"0.86944","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03167","scoring_system":"epss","scoring_elements":"0.86879","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03167","scoring_system":"epss","scoring_elements":"0.8693","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03167","scoring_system":"epss","scoring_elements":"0.86922","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03167","scoring_system":"epss","scoring_elements":"0.86902","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03167","scoring_system":"epss","scoring_elements":"0.86909","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03167","scoring_system":"epss","scoring_elements":"0.8689","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04919","scoring_system":"epss","scoring_elements":"0.89689","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04919","scoring_system":"epss","scoring_elements":"0.89654","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04919","scoring_system":"epss","scoring_elements":"0.89671","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04919","scoring_system":"epss","scoring_elements":"0.89684","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04919","scoring_system":"epss","scoring_elements":"0.89679","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05167","scoring_system":"epss","scoring_elements":"0.89925","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05167","scoring_system":"epss","scoring_elements":"0.89923","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05167","scoring_system":"epss","scoring_elements":"0.89924","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05167","scoring_system":"epss","scoring_elements":"0.89915","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05167","scoring_system":"epss","scoring_elements":"0.89909","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1595024","reference_id":"1595024","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1595024"},{"reference_url":"https://security.archlinux.org/ASA-201806-14","reference_id":"ASA-201806-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201806-14"},{"reference_url":"https://security.archlinux.org/ASA-201807-4","reference_id":"ASA-201807-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201807-4"},{"reference_url":"https://security.archlinux.org/AVG-727","reference_id":"AVG-727","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-727"},{"reference_url":"https://security.archlinux.org/AVG-728","reference_id":"AVG-728","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-728"},{"reference_url":"https://security.gentoo.org/glsa/201811-13","reference_id":"GLSA-201811-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-15","reference_id":"mfsa2018-15","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-16","reference_id":"mfsa2018-16","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-16"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-17","reference_id":"mfsa2018-17","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-17"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-18","reference_id":"mfsa2018-18","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-19","reference_id":"mfsa2018-19","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2112","reference_id":"RHSA-2018:2112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2113","reference_id":"RHSA-2018:2113","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2251","reference_id":"RHSA-2018:2251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2251"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2252","reference_id":"RHSA-2018:2252","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2252"},{"reference_url":"https://usn.ubuntu.com/3705-1/","reference_id":"USN-3705-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3705-1/"},{"reference_url":"https://usn.ubuntu.com/3714-1/","reference_id":"USN-3714-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3714-1/"}],"fixed_packages":[],"aliases":["CVE-2018-12359"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ym7a-e9b5-5ygm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60745?format=json","vulnerability_id":"VCID-zpx3-dck3-6bfy","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6126.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6126.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6126","reference_id":"","reference_type":"","scores":[{"value":"0.41185","scoring_system":"epss","scoring_elements":"0.97414","published_at":"2026-05-07T12:55:00Z"},{"value":"0.41185","scoring_system":"epss","scoring_elements":"0.9741","published_at":"2026-05-05T12:55:00Z"},{"value":"0.41185","scoring_system":"epss","scoring_elements":"0.97426","published_at":"2026-05-12T12:55:00Z"},{"value":"0.41185","scoring_system":"epss","scoring_elements":"0.97399","published_at":"2026-04-24T12:55:00Z"},{"value":"0.41185","scoring_system":"epss","scoring_elements":"0.97398","published_at":"2026-04-21T12:55:00Z"},{"value":"0.41185","scoring_system":"epss","scoring_elements":"0.97401","published_at":"2026-04-26T12:55:00Z"},{"value":"0.41185","scoring_system":"epss","scoring_elements":"0.97405","published_at":"2026-04-29T12:55:00Z"},{"value":"0.41185","scoring_system":"epss","scoring_elements":"0.97417","published_at":"2026-05-09T12:55:00Z"},{"value":"0.41185","scoring_system":"epss","scoring_elements":"0.97421","published_at":"2026-05-11T12:55:00Z"},{"value":"0.45608","scoring_system":"epss","scoring_elements":"0.97613","published_at":"2026-04-11T12:55:00Z"},{"value":"0.45608","scoring_system":"epss","scoring_elements":"0.97592","published_at":"2026-04-01T12:55:00Z"},{"value":"0.45608","scoring_system":"epss","scoring_elements":"0.97598","published_at":"2026-04-02T12:55:00Z"},{"value":"0.45608","scoring_system":"epss","scoring_elements":"0.97601","published_at":"2026-04-04T12:55:00Z"},{"value":"0.45608","scoring_system":"epss","scoring_elements":"0.97602","published_at":"2026-04-07T12:55:00Z"},{"value":"0.45608","scoring_system":"epss","scoring_elements":"0.97608","published_at":"2026-04-08T12:55:00Z"},{"value":"0.45608","scoring_system":"epss","scoring_elements":"0.9761","published_at":"2026-04-09T12:55:00Z"},{"value":"0.45608","scoring_system":"epss","scoring_elements":"0.97615","published_at":"2026-04-13T12:55:00Z"},{"value":"0.45608","scoring_system":"epss","scoring_elements":"0.97623","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6126"},{"reference_url":"https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html","reference_id":"","reference_type":"","scores":[],"url":"https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html"},{"reference_url":"https://crbug.com/844457","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/844457"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6118","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6120","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6120"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6122","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6122"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6123","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6126","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6136","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6136"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6137"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6140","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6141","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6141"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6148"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6149","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6149"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/201810-01","reference_id":"","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-01"},{"reference_url":"https://www.debian.org/security/2018/dsa-4220","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4220"},{"reference_url":"https://www.debian.org/security/2018/dsa-4237","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4237"},{"reference_url":"https://www.exploit-db.com/exploits/45098/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/45098/"},{"reference_url":"http://www.securityfocus.com/bid/104309","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104309"},{"reference_url":"http://www.securityfocus.com/bid/104411","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104411"},{"reference_url":"http://www.securitytracker.com/id/1041014","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1041014"},{"reference_url":"http://www.securitytracker.com/id/1041046","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1041046"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1584035","reference_id":"1584035","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1584035"},{"reference_url":"https://security.archlinux.org/ASA-201806-5","reference_id":"ASA-201806-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201806-5"},{"reference_url":"https://security.archlinux.org/AVG-715","reference_id":"AVG-715","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-715"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1579","reference_id":"CVE-2018-6126","reference_type":"exploit","scores":[],"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1579"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/45098.txt","reference_id":"CVE-2018-6126","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/45098.txt"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-6126","reference_id":"CVE-2018-6126","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-6126"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-14","reference_id":"mfsa2018-14","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2018-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1815","reference_id":"RHSA-2018:1815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2112","reference_id":"RHSA-2018:2112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2113","reference_id":"RHSA-2018:2113","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2113"},{"reference_url":"https://usn.ubuntu.com/3682-1/","reference_id":"USN-3682-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3682-1/"}],"fixed_packages":[],"aliases":["CVE-2018-6126"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zpx3-dck3-6bfy"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@60.1.0-5%3Farch=el6"}