Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/firefox-esr@115.3.0-r0?arch=armv7&distroversion=v3.20&reponame=community
Typeapk
Namespacealpine
Namefirefox-esr
Version115.3.0-r0
Qualifiers
arch armv7
distroversion v3.20
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version115.3.1-r0
Latest_non_vulnerable_version115.17.0-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1dkk-86db-s3ch
vulnerability_id VCID-1dkk-86db-s3ch
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5168.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5168.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5168
reference_id
reference_type
scores
0
value 0.00256
scoring_system epss
scoring_elements 0.4897
published_at 2026-04-29T12:55:00Z
1
value 0.00256
scoring_system epss
scoring_elements 0.49006
published_at 2026-04-24T12:55:00Z
2
value 0.00256
scoring_system epss
scoring_elements 0.48984
published_at 2026-04-02T12:55:00Z
3
value 0.00256
scoring_system epss
scoring_elements 0.48965
published_at 2026-04-07T12:55:00Z
4
value 0.00256
scoring_system epss
scoring_elements 0.49011
published_at 2026-04-13T12:55:00Z
5
value 0.00256
scoring_system epss
scoring_elements 0.49019
published_at 2026-04-08T12:55:00Z
6
value 0.00256
scoring_system epss
scoring_elements 0.4902
published_at 2026-04-21T12:55:00Z
7
value 0.00256
scoring_system epss
scoring_elements 0.49052
published_at 2026-04-18T12:55:00Z
8
value 0.00256
scoring_system epss
scoring_elements 0.49056
published_at 2026-04-16T12:55:00Z
9
value 0.00256
scoring_system epss
scoring_elements 0.49005
published_at 2026-04-12T12:55:00Z
10
value 0.00256
scoring_system epss
scoring_elements 0.49032
published_at 2026-04-11T12:55:00Z
11
value 0.00256
scoring_system epss
scoring_elements 0.49015
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5168
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2240892
reference_id 2240892
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2240892
3
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
reference_id mfsa2023-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
5
reference_url https://www.mozilla.org/security/advisories/mfsa2023-41/
reference_id mfsa2023-41
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:10Z/
url https://www.mozilla.org/security/advisories/mfsa2023-41/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-42
reference_id mfsa2023-42
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-42
7
reference_url https://www.mozilla.org/security/advisories/mfsa2023-42/
reference_id mfsa2023-42
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:10Z/
url https://www.mozilla.org/security/advisories/mfsa2023-42/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-43
reference_id mfsa2023-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-43
9
reference_url https://www.mozilla.org/security/advisories/mfsa2023-43/
reference_id mfsa2023-43
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:10Z/
url https://www.mozilla.org/security/advisories/mfsa2023-43/
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1846683
reference_id show_bug.cgi?id=1846683
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:10Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1846683
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.3.0-r0?arch=armv7&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@115.3.0-r0?arch=armv7&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.3.0-r0%3Farch=armv7&distroversion=v3.20&reponame=community
aliases CVE-2023-5168
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1dkk-86db-s3ch
1
url VCID-6zjy-1agk-nbd9
vulnerability_id VCID-6zjy-1agk-nbd9
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5174.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5174.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5174
reference_id
reference_type
scores
0
value 0.00445
scoring_system epss
scoring_elements 0.63478
published_at 2026-04-29T12:55:00Z
1
value 0.00445
scoring_system epss
scoring_elements 0.63482
published_at 2026-04-26T12:55:00Z
2
value 0.00445
scoring_system epss
scoring_elements 0.63397
published_at 2026-04-02T12:55:00Z
3
value 0.00445
scoring_system epss
scoring_elements 0.63469
published_at 2026-04-24T12:55:00Z
4
value 0.00445
scoring_system epss
scoring_elements 0.63452
published_at 2026-04-21T12:55:00Z
5
value 0.00445
scoring_system epss
scoring_elements 0.63466
published_at 2026-04-18T12:55:00Z
6
value 0.00445
scoring_system epss
scoring_elements 0.63459
published_at 2026-04-09T12:55:00Z
7
value 0.00445
scoring_system epss
scoring_elements 0.6339
published_at 2026-04-07T12:55:00Z
8
value 0.00445
scoring_system epss
scoring_elements 0.63441
published_at 2026-04-08T12:55:00Z
9
value 0.00445
scoring_system epss
scoring_elements 0.63458
published_at 2026-04-16T12:55:00Z
10
value 0.00445
scoring_system epss
scoring_elements 0.6346
published_at 2026-04-12T12:55:00Z
11
value 0.00445
scoring_system epss
scoring_elements 0.63476
published_at 2026-04-11T12:55:00Z
12
value 0.00445
scoring_system epss
scoring_elements 0.63424
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5174
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2240895
reference_id 2240895
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2240895
3
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
reference_id mfsa2023-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
5
reference_url https://www.mozilla.org/security/advisories/mfsa2023-41/
reference_id mfsa2023-41
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/
url https://www.mozilla.org/security/advisories/mfsa2023-41/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-42
reference_id mfsa2023-42
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-42
7
reference_url https://www.mozilla.org/security/advisories/mfsa2023-42/
reference_id mfsa2023-42
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/
url https://www.mozilla.org/security/advisories/mfsa2023-42/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-43
reference_id mfsa2023-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-43
9
reference_url https://www.mozilla.org/security/advisories/mfsa2023-43/
reference_id mfsa2023-43
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/
url https://www.mozilla.org/security/advisories/mfsa2023-43/
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1848454
reference_id show_bug.cgi?id=1848454
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1848454
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.3.0-r0?arch=armv7&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@115.3.0-r0?arch=armv7&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.3.0-r0%3Farch=armv7&distroversion=v3.20&reponame=community
aliases CVE-2023-5174
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6zjy-1agk-nbd9
2
url VCID-8fny-dsut-7ba3
vulnerability_id VCID-8fny-dsut-7ba3
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5171.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5171.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5171
reference_id
reference_type
scores
0
value 0.0026
scoring_system epss
scoring_elements 0.49368
published_at 2026-04-29T12:55:00Z
1
value 0.0026
scoring_system epss
scoring_elements 0.49412
published_at 2026-04-26T12:55:00Z
2
value 0.0026
scoring_system epss
scoring_elements 0.49374
published_at 2026-04-02T12:55:00Z
3
value 0.0026
scoring_system epss
scoring_elements 0.49355
published_at 2026-04-07T12:55:00Z
4
value 0.0026
scoring_system epss
scoring_elements 0.49401
published_at 2026-04-24T12:55:00Z
5
value 0.0026
scoring_system epss
scoring_elements 0.4941
published_at 2026-04-08T12:55:00Z
6
value 0.0026
scoring_system epss
scoring_elements 0.49411
published_at 2026-04-21T12:55:00Z
7
value 0.0026
scoring_system epss
scoring_elements 0.49441
published_at 2026-04-18T12:55:00Z
8
value 0.0026
scoring_system epss
scoring_elements 0.49444
published_at 2026-04-16T12:55:00Z
9
value 0.0026
scoring_system epss
scoring_elements 0.49398
published_at 2026-04-13T12:55:00Z
10
value 0.0026
scoring_system epss
scoring_elements 0.49396
published_at 2026-04-12T12:55:00Z
11
value 0.0026
scoring_system epss
scoring_elements 0.49423
published_at 2026-04-11T12:55:00Z
12
value 0.0026
scoring_system epss
scoring_elements 0.49405
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5171
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2240894
reference_id 2240894
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2240894
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/
reference_id AY642Z6JZODQJE7Z62CFREVUHEGCXGPD
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/
8
reference_url https://www.debian.org/security/2023/dsa-5506
reference_id dsa-5506
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/
url https://www.debian.org/security/2023/dsa-5506
9
reference_url https://www.debian.org/security/2023/dsa-5513
reference_id dsa-5513
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/
url https://www.debian.org/security/2023/dsa-5513
10
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
reference_id mfsa2023-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
12
reference_url https://www.mozilla.org/security/advisories/mfsa2023-41/
reference_id mfsa2023-41
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/
url https://www.mozilla.org/security/advisories/mfsa2023-41/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-42
reference_id mfsa2023-42
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-42
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-42/
reference_id mfsa2023-42
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/
url https://www.mozilla.org/security/advisories/mfsa2023-42/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-43
reference_id mfsa2023-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-43
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-43/
reference_id mfsa2023-43
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/
url https://www.mozilla.org/security/advisories/mfsa2023-43/
17
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html
18
reference_url https://access.redhat.com/errata/RHSA-2023:5426
reference_id RHSA-2023:5426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5426
19
reference_url https://access.redhat.com/errata/RHSA-2023:5427
reference_id RHSA-2023:5427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5427
20
reference_url https://access.redhat.com/errata/RHSA-2023:5428
reference_id RHSA-2023:5428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5428
21
reference_url https://access.redhat.com/errata/RHSA-2023:5429
reference_id RHSA-2023:5429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5429
22
reference_url https://access.redhat.com/errata/RHSA-2023:5430
reference_id RHSA-2023:5430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5430
23
reference_url https://access.redhat.com/errata/RHSA-2023:5432
reference_id RHSA-2023:5432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5432
24
reference_url https://access.redhat.com/errata/RHSA-2023:5433
reference_id RHSA-2023:5433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5433
25
reference_url https://access.redhat.com/errata/RHSA-2023:5434
reference_id RHSA-2023:5434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5434
26
reference_url https://access.redhat.com/errata/RHSA-2023:5435
reference_id RHSA-2023:5435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5435
27
reference_url https://access.redhat.com/errata/RHSA-2023:5436
reference_id RHSA-2023:5436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5436
28
reference_url https://access.redhat.com/errata/RHSA-2023:5437
reference_id RHSA-2023:5437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5437
29
reference_url https://access.redhat.com/errata/RHSA-2023:5438
reference_id RHSA-2023:5438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5438
30
reference_url https://access.redhat.com/errata/RHSA-2023:5439
reference_id RHSA-2023:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5439
31
reference_url https://access.redhat.com/errata/RHSA-2023:5440
reference_id RHSA-2023:5440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5440
32
reference_url https://access.redhat.com/errata/RHSA-2023:5475
reference_id RHSA-2023:5475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5475
33
reference_url https://access.redhat.com/errata/RHSA-2023:5477
reference_id RHSA-2023:5477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5477
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1851599
reference_id show_bug.cgi?id=1851599
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1851599
35
reference_url https://usn.ubuntu.com/6404-1/
reference_id USN-6404-1
reference_type
scores
url https://usn.ubuntu.com/6404-1/
36
reference_url https://usn.ubuntu.com/6405-1/
reference_id USN-6405-1
reference_type
scores
url https://usn.ubuntu.com/6405-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.3.0-r0?arch=armv7&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@115.3.0-r0?arch=armv7&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.3.0-r0%3Farch=armv7&distroversion=v3.20&reponame=community
aliases CVE-2023-5171
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8fny-dsut-7ba3
3
url VCID-jzte-jqk6-7ya6
vulnerability_id VCID-jzte-jqk6-7ya6
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5169.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5169.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5169
reference_id
reference_type
scores
0
value 0.0024
scoring_system epss
scoring_elements 0.47018
published_at 2026-04-29T12:55:00Z
1
value 0.0024
scoring_system epss
scoring_elements 0.47059
published_at 2026-04-24T12:55:00Z
2
value 0.0024
scoring_system epss
scoring_elements 0.4705
published_at 2026-04-02T12:55:00Z
3
value 0.0024
scoring_system epss
scoring_elements 0.47016
published_at 2026-04-07T12:55:00Z
4
value 0.0024
scoring_system epss
scoring_elements 0.47068
published_at 2026-04-09T12:55:00Z
5
value 0.0024
scoring_system epss
scoring_elements 0.47069
published_at 2026-04-26T12:55:00Z
6
value 0.0024
scoring_system epss
scoring_elements 0.47071
published_at 2026-04-08T12:55:00Z
7
value 0.0024
scoring_system epss
scoring_elements 0.47125
published_at 2026-04-18T12:55:00Z
8
value 0.0024
scoring_system epss
scoring_elements 0.47129
published_at 2026-04-16T12:55:00Z
9
value 0.0024
scoring_system epss
scoring_elements 0.47073
published_at 2026-04-21T12:55:00Z
10
value 0.0024
scoring_system epss
scoring_elements 0.47066
published_at 2026-04-12T12:55:00Z
11
value 0.0024
scoring_system epss
scoring_elements 0.47092
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5169
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2240893
reference_id 2240893
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2240893
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/
reference_id AY642Z6JZODQJE7Z62CFREVUHEGCXGPD
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/
8
reference_url https://www.debian.org/security/2023/dsa-5506
reference_id dsa-5506
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/
url https://www.debian.org/security/2023/dsa-5506
9
reference_url https://www.debian.org/security/2023/dsa-5513
reference_id dsa-5513
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/
url https://www.debian.org/security/2023/dsa-5513
10
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
reference_id mfsa2023-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
12
reference_url https://www.mozilla.org/security/advisories/mfsa2023-41/
reference_id mfsa2023-41
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/
url https://www.mozilla.org/security/advisories/mfsa2023-41/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-42
reference_id mfsa2023-42
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-42
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-42/
reference_id mfsa2023-42
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/
url https://www.mozilla.org/security/advisories/mfsa2023-42/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-43
reference_id mfsa2023-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-43
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-43/
reference_id mfsa2023-43
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/
url https://www.mozilla.org/security/advisories/mfsa2023-43/
17
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html
18
reference_url https://access.redhat.com/errata/RHSA-2023:5426
reference_id RHSA-2023:5426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5426
19
reference_url https://access.redhat.com/errata/RHSA-2023:5427
reference_id RHSA-2023:5427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5427
20
reference_url https://access.redhat.com/errata/RHSA-2023:5428
reference_id RHSA-2023:5428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5428
21
reference_url https://access.redhat.com/errata/RHSA-2023:5429
reference_id RHSA-2023:5429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5429
22
reference_url https://access.redhat.com/errata/RHSA-2023:5430
reference_id RHSA-2023:5430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5430
23
reference_url https://access.redhat.com/errata/RHSA-2023:5432
reference_id RHSA-2023:5432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5432
24
reference_url https://access.redhat.com/errata/RHSA-2023:5433
reference_id RHSA-2023:5433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5433
25
reference_url https://access.redhat.com/errata/RHSA-2023:5434
reference_id RHSA-2023:5434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5434
26
reference_url https://access.redhat.com/errata/RHSA-2023:5435
reference_id RHSA-2023:5435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5435
27
reference_url https://access.redhat.com/errata/RHSA-2023:5436
reference_id RHSA-2023:5436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5436
28
reference_url https://access.redhat.com/errata/RHSA-2023:5437
reference_id RHSA-2023:5437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5437
29
reference_url https://access.redhat.com/errata/RHSA-2023:5438
reference_id RHSA-2023:5438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5438
30
reference_url https://access.redhat.com/errata/RHSA-2023:5439
reference_id RHSA-2023:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5439
31
reference_url https://access.redhat.com/errata/RHSA-2023:5440
reference_id RHSA-2023:5440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5440
32
reference_url https://access.redhat.com/errata/RHSA-2023:5475
reference_id RHSA-2023:5475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5475
33
reference_url https://access.redhat.com/errata/RHSA-2023:5477
reference_id RHSA-2023:5477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5477
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1846685
reference_id show_bug.cgi?id=1846685
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1846685
35
reference_url https://usn.ubuntu.com/6404-1/
reference_id USN-6404-1
reference_type
scores
url https://usn.ubuntu.com/6404-1/
36
reference_url https://usn.ubuntu.com/6405-1/
reference_id USN-6405-1
reference_type
scores
url https://usn.ubuntu.com/6405-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.3.0-r0?arch=armv7&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@115.3.0-r0?arch=armv7&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.3.0-r0%3Farch=armv7&distroversion=v3.20&reponame=community
aliases CVE-2023-5169
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jzte-jqk6-7ya6
4
url VCID-rbna-kkn2-2baj
vulnerability_id VCID-rbna-kkn2-2baj
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5176.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5176.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5176
reference_id
reference_type
scores
0
value 0.00704
scoring_system epss
scoring_elements 0.72166
published_at 2026-04-29T12:55:00Z
1
value 0.00704
scoring_system epss
scoring_elements 0.72172
published_at 2026-04-26T12:55:00Z
2
value 0.00704
scoring_system epss
scoring_elements 0.72047
published_at 2026-04-02T12:55:00Z
3
value 0.00704
scoring_system epss
scoring_elements 0.72163
published_at 2026-04-24T12:55:00Z
4
value 0.00704
scoring_system epss
scoring_elements 0.72119
published_at 2026-04-21T12:55:00Z
5
value 0.00704
scoring_system epss
scoring_elements 0.72134
published_at 2026-04-18T12:55:00Z
6
value 0.00704
scoring_system epss
scoring_elements 0.72043
published_at 2026-04-07T12:55:00Z
7
value 0.00704
scoring_system epss
scoring_elements 0.72126
published_at 2026-04-16T12:55:00Z
8
value 0.00704
scoring_system epss
scoring_elements 0.72085
published_at 2026-04-13T12:55:00Z
9
value 0.00704
scoring_system epss
scoring_elements 0.721
published_at 2026-04-12T12:55:00Z
10
value 0.00704
scoring_system epss
scoring_elements 0.72115
published_at 2026-04-11T12:55:00Z
11
value 0.00704
scoring_system epss
scoring_elements 0.72092
published_at 2026-04-09T12:55:00Z
12
value 0.00704
scoring_system epss
scoring_elements 0.72067
published_at 2026-04-04T12:55:00Z
13
value 0.00704
scoring_system epss
scoring_elements 0.7208
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5176
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2240896
reference_id 2240896
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2240896
7
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1836353%2C1842674%2C1843824%2C1843962%2C1848890%2C1850180%2C1850983%2C1851195
reference_id buglist.cgi?bug_id=1836353%2C1842674%2C1843824%2C1843962%2C1848890%2C1850180%2C1850983%2C1851195
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1836353%2C1842674%2C1843824%2C1843962%2C1848890%2C1850180%2C1850983%2C1851195
8
reference_url https://www.debian.org/security/2023/dsa-5506
reference_id dsa-5506
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://www.debian.org/security/2023/dsa-5506
9
reference_url https://www.debian.org/security/2023/dsa-5513
reference_id dsa-5513
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://www.debian.org/security/2023/dsa-5513
10
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
reference_id mfsa2023-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
12
reference_url https://www.mozilla.org/security/advisories/mfsa2023-41/
reference_id mfsa2023-41
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://www.mozilla.org/security/advisories/mfsa2023-41/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-42
reference_id mfsa2023-42
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-42
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-42/
reference_id mfsa2023-42
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://www.mozilla.org/security/advisories/mfsa2023-42/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-43
reference_id mfsa2023-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-43
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-43/
reference_id mfsa2023-43
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://www.mozilla.org/security/advisories/mfsa2023-43/
17
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html
18
reference_url https://access.redhat.com/errata/RHSA-2023:5426
reference_id RHSA-2023:5426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5426
19
reference_url https://access.redhat.com/errata/RHSA-2023:5427
reference_id RHSA-2023:5427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5427
20
reference_url https://access.redhat.com/errata/RHSA-2023:5428
reference_id RHSA-2023:5428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5428
21
reference_url https://access.redhat.com/errata/RHSA-2023:5429
reference_id RHSA-2023:5429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5429
22
reference_url https://access.redhat.com/errata/RHSA-2023:5430
reference_id RHSA-2023:5430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5430
23
reference_url https://access.redhat.com/errata/RHSA-2023:5432
reference_id RHSA-2023:5432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5432
24
reference_url https://access.redhat.com/errata/RHSA-2023:5433
reference_id RHSA-2023:5433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5433
25
reference_url https://access.redhat.com/errata/RHSA-2023:5434
reference_id RHSA-2023:5434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5434
26
reference_url https://access.redhat.com/errata/RHSA-2023:5435
reference_id RHSA-2023:5435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5435
27
reference_url https://access.redhat.com/errata/RHSA-2023:5436
reference_id RHSA-2023:5436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5436
28
reference_url https://access.redhat.com/errata/RHSA-2023:5437
reference_id RHSA-2023:5437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5437
29
reference_url https://access.redhat.com/errata/RHSA-2023:5438
reference_id RHSA-2023:5438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5438
30
reference_url https://access.redhat.com/errata/RHSA-2023:5439
reference_id RHSA-2023:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5439
31
reference_url https://access.redhat.com/errata/RHSA-2023:5440
reference_id RHSA-2023:5440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5440
32
reference_url https://access.redhat.com/errata/RHSA-2023:5475
reference_id RHSA-2023:5475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5475
33
reference_url https://access.redhat.com/errata/RHSA-2023:5477
reference_id RHSA-2023:5477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5477
34
reference_url https://usn.ubuntu.com/6404-1/
reference_id USN-6404-1
reference_type
scores
url https://usn.ubuntu.com/6404-1/
35
reference_url https://usn.ubuntu.com/6405-1/
reference_id USN-6405-1
reference_type
scores
url https://usn.ubuntu.com/6405-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@115.3.0-r0?arch=armv7&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@115.3.0-r0?arch=armv7&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.3.0-r0%3Farch=armv7&distroversion=v3.20&reponame=community
aliases CVE-2023-5176
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rbna-kkn2-2baj
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.3.0-r0%3Farch=armv7&distroversion=v3.20&reponame=community