{"url":"http://public2.vulnerablecode.io/api/packages/377692?format=json","purl":"pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=x86&distroversion=v3.23&reponame=community","type":"apk","namespace":"alpine","name":"firefox-esr","version":"115.6.0-r0","qualifiers":{"arch":"x86","distroversion":"v3.23","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61493?format=json","vulnerability_id":"VCID-4g3s-bh4t-qqhc","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6867.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6867.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6867","reference_id":"","reference_type":"","scores":[{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.75059","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.75021","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.75067","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.75064","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.7606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.76048","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.7608","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.76093","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.76107","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.76132","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.76108","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.76106","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.76147","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.7615","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255366","reference_id":"2255366","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255366"},{"reference_url":"https://www.debian.org/security/2023/dsa-5581","reference_id":"dsa-5581","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/"}],"url":"https://www.debian.org/security/2023/dsa-5581"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-54/","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-54/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-56/","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-56/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html","reference_id":"msg00020.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1863863","reference_id":"show_bug.cgi?id=1863863","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1863863"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/377692?format=json","purl":"pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=x86&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=x86&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2023-6867"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4g3s-bh4t-qqhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51437?format=json","vulnerability_id":"VCID-5qf5-d44c-t7gu","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6862.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6862.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6862","reference_id":"","reference_type":"","scores":[{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.5868","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58615","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58675","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58643","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58663","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58682","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58664","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58658","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58636","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63295","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63264","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63283","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63297","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255368","reference_id":"2255368","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255368"},{"reference_url":"https://www.debian.org/security/2023/dsa-5581","reference_id":"dsa-5581","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/"}],"url":"https://www.debian.org/security/2023/dsa-5581"},{"reference_url":"https://www.debian.org/security/2023/dsa-5582","reference_id":"dsa-5582","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/"}],"url":"https://www.debian.org/security/2023/dsa-5582"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-54/","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-54/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-55/","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-55/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html","reference_id":"msg00020.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1868042","reference_id":"show_bug.cgi?id=1868042","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1868042"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/377692?format=json","purl":"pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=x86&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=x86&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2023-6862"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5qf5-d44c-t7gu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61491?format=json","vulnerability_id":"VCID-9saf-1zax-5ycy","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6865.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6865.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6865","reference_id":"","reference_type":"","scores":[{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61562","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61568","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61565","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61552","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71614","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71621","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71602","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71647","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71652","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71637","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71572","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.7159","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71563","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71603","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255361","reference_id":"2255361","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255361"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/377692?format=json","purl":"pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=x86&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=x86&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2023-6865"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9saf-1zax-5ycy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51434?format=json","vulnerability_id":"VCID-9z3s-qfbc-vbdc","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6859.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6859.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6859","reference_id":"","reference_type":"","scores":[{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59159","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59175","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.6157","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61565","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63656","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63608","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63645","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63654","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63641","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63583","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63609","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63573","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63625","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255364","reference_id":"2255364","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255364"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/377692?format=json","purl":"pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=x86&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=x86&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2023-6859"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9z3s-qfbc-vbdc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51435?format=json","vulnerability_id":"VCID-bw96-5g6y-j3c4","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6860.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6860.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6860","reference_id":"","reference_type":"","scores":[{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62881","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63638","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63657","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64619","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64653","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.6464","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64612","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64648","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64659","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64636","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64584","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64613","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64571","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255365","reference_id":"2255365","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255365"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/377692?format=json","purl":"pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=x86&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=x86&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2023-6860"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bw96-5g6y-j3c4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51438?format=json","vulnerability_id":"VCID-f6qv-znt2-2bd5","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6863.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6863.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6863","reference_id":"","reference_type":"","scores":[{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64403","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.6437","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.6439","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66189","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66222","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66178","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66214","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66228","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66203","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66146","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66173","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66141","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255369","reference_id":"2255369","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255369"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/377692?format=json","purl":"pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=x86&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=x86&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2023-6863"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f6qv-znt2-2bd5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51432?format=json","vulnerability_id":"VCID-kskc-agaw-8bcr","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6857.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6857.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6857","reference_id":"","reference_type":"","scores":[{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40745","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40775","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40755","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40783","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40707","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40757","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40764","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.4073","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40749","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45367","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45504","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45418","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45428","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255362","reference_id":"2255362","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255362"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/377692?format=json","purl":"pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=x86&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=x86&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2023-6857"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kskc-agaw-8bcr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51439?format=json","vulnerability_id":"VCID-pepm-1t68-uuf1","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6864.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6864.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6864","reference_id":"","reference_type":"","scores":[{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65731","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65732","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65721","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65706","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69201","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69208","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.6918","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69219","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69228","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69223","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.6913","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69151","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69132","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69182","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255370","reference_id":"2255370","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255370"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/377692?format=json","purl":"pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=x86&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=x86&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2023-6864"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pepm-1t68-uuf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51431?format=json","vulnerability_id":"VCID-qdqj-rhcr-wbca","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6856.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6856.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6856","reference_id":"","reference_type":"","scores":[{"value":"0.10471","scoring_system":"epss","scoring_elements":"0.93273","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10471","scoring_system":"epss","scoring_elements":"0.9327","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10471","scoring_system":"epss","scoring_elements":"0.93266","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10471","scoring_system":"epss","scoring_elements":"0.93268","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93422","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93441","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93446","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93421","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93397","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93405","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93413","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93416","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255360","reference_id":"2255360","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255360"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/377692?format=json","purl":"pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=x86&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=x86&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2023-6856"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qdqj-rhcr-wbca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51433?format=json","vulnerability_id":"VCID-tps4-kxe2-5ugb","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6858.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6858.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6858","reference_id":"","reference_type":"","scores":[{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61774","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61769","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.6178","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61764","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63723","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.6376","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63748","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63788","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63778","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63742","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63776","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63791","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63777","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255363","reference_id":"2255363","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255363"},{"reference_url":"https://www.debian.org/security/2023/dsa-5581","reference_id":"dsa-5581","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://www.debian.org/security/2023/dsa-5581"},{"reference_url":"https://www.debian.org/security/2023/dsa-5582","reference_id":"dsa-5582","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://www.debian.org/security/2023/dsa-5582"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-54/","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-54/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-55/","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-55/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-56/","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-56/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html","reference_id":"msg00020.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1826791","reference_id":"show_bug.cgi?id=1826791","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1826791"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/377692?format=json","purl":"pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=x86&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=x86&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2023-6858"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tps4-kxe2-5ugb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51436?format=json","vulnerability_id":"VCID-zhu4-sy56-1yea","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6861.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6861.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6861","reference_id":"","reference_type":"","scores":[{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.6171","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61704","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61609","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61639","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61658","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61672","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61694","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61663","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61682","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66004","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65975","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65995","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66006","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255367","reference_id":"2255367","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255367"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/377692?format=json","purl":"pkg:apk/alpine/firefox-esr@115.6.0-r0?arch=x86&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=x86&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2023-6861"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zhu4-sy56-1yea"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.6.0-r0%3Farch=x86&distroversion=v3.23&reponame=community"}