{"url":"http://public2.vulnerablecode.io/api/packages/435516?format=json","purl":"pkg:apk/alpine/firefox-esr@115.5.0-r0?arch=x86&distroversion=v3.21&reponame=community","type":"apk","namespace":"alpine","name":"firefox-esr","version":"115.5.0-r0","qualifiers":{"arch":"x86","distroversion":"v3.21","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"115.6.0-r0","latest_non_vulnerable_version":"115.6.0-r0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51425?format=json","vulnerability_id":"VCID-87mf-fznn-m3gy","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6205.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6205.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6205","reference_id":"","reference_type":"","scores":[{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61651","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61613","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61627","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61648","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61637","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61617","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61659","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61664","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61649","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61641","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61657","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61565","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61594","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61564","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250897","reference_id":"2250897","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250897"},{"reference_url":"https://www.debian.org/security/2023/dsa-5561","reference_id":"dsa-5561","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/"}],"url":"https://www.debian.org/security/2023/dsa-5561"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49","reference_id":"mfsa2023-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-49/","reference_id":"mfsa2023-49","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-49/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50","reference_id":"mfsa2023-50","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-50/","reference_id":"mfsa2023-50","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-50/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52","reference_id":"mfsa2023-52","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-52/","reference_id":"mfsa2023-52","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-52/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00030.html","reference_id":"msg00030.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00030.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7499","reference_id":"RHSA-2023:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7500","reference_id":"RHSA-2023:7500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7501","reference_id":"RHSA-2023:7501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7502","reference_id":"RHSA-2023:7502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7503","reference_id":"RHSA-2023:7503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7504","reference_id":"RHSA-2023:7504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7505","reference_id":"RHSA-2023:7505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7506","reference_id":"RHSA-2023:7506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7507","reference_id":"RHSA-2023:7507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7508","reference_id":"RHSA-2023:7508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7509","reference_id":"RHSA-2023:7509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7510","reference_id":"RHSA-2023:7510","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7510"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7511","reference_id":"RHSA-2023:7511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7512","reference_id":"RHSA-2023:7512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7547","reference_id":"RHSA-2023:7547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7569","reference_id":"RHSA-2023:7569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7570","reference_id":"RHSA-2023:7570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7573","reference_id":"RHSA-2023:7573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7574","reference_id":"RHSA-2023:7574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7577","reference_id":"RHSA-2023:7577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7577"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1854076","reference_id":"show_bug.cgi?id=1854076","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1854076"},{"reference_url":"https://usn.ubuntu.com/6509-1/","reference_id":"USN-6509-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6509-1/"},{"reference_url":"https://usn.ubuntu.com/6515-1/","reference_id":"USN-6515-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6515-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/435516?format=json","purl":"pkg:apk/alpine/firefox-esr@115.5.0-r0?arch=x86&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.5.0-r0%3Farch=x86&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2023-6205"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-87mf-fznn-m3gy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51426?format=json","vulnerability_id":"VCID-e6bs-vk6j-h3e6","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6206.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6206.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6206","reference_id":"","reference_type":"","scores":[{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62492","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62485","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62478","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62495","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62387","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62418","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62384","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62432","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62449","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62468","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62458","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62435","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62479","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250898","reference_id":"2250898","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250898"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49","reference_id":"mfsa2023-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50","reference_id":"mfsa2023-50","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52","reference_id":"mfsa2023-52","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7499","reference_id":"RHSA-2023:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7500","reference_id":"RHSA-2023:7500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7501","reference_id":"RHSA-2023:7501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7502","reference_id":"RHSA-2023:7502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7503","reference_id":"RHSA-2023:7503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7504","reference_id":"RHSA-2023:7504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7505","reference_id":"RHSA-2023:7505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7506","reference_id":"RHSA-2023:7506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7507","reference_id":"RHSA-2023:7507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7508","reference_id":"RHSA-2023:7508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7509","reference_id":"RHSA-2023:7509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7510","reference_id":"RHSA-2023:7510","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7510"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7511","reference_id":"RHSA-2023:7511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7512","reference_id":"RHSA-2023:7512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7547","reference_id":"RHSA-2023:7547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7569","reference_id":"RHSA-2023:7569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7570","reference_id":"RHSA-2023:7570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7573","reference_id":"RHSA-2023:7573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7574","reference_id":"RHSA-2023:7574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7577","reference_id":"RHSA-2023:7577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7577"},{"reference_url":"https://usn.ubuntu.com/6509-1/","reference_id":"USN-6509-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6509-1/"},{"reference_url":"https://usn.ubuntu.com/6515-1/","reference_id":"USN-6515-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6515-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/435516?format=json","purl":"pkg:apk/alpine/firefox-esr@115.5.0-r0?arch=x86&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.5.0-r0%3Farch=x86&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2023-6206"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e6bs-vk6j-h3e6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51424?format=json","vulnerability_id":"VCID-fwr3-cgq1-a3b4","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6204.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6204.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6204","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50014","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50096","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50055","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50059","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50038","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50067","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50016","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50071","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50064","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50082","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50054","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5005","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50095","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250896","reference_id":"2250896","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250896"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49","reference_id":"mfsa2023-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50","reference_id":"mfsa2023-50","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52","reference_id":"mfsa2023-52","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7499","reference_id":"RHSA-2023:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7500","reference_id":"RHSA-2023:7500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7501","reference_id":"RHSA-2023:7501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7502","reference_id":"RHSA-2023:7502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7503","reference_id":"RHSA-2023:7503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7504","reference_id":"RHSA-2023:7504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7505","reference_id":"RHSA-2023:7505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7506","reference_id":"RHSA-2023:7506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7507","reference_id":"RHSA-2023:7507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7508","reference_id":"RHSA-2023:7508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7509","reference_id":"RHSA-2023:7509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7510","reference_id":"RHSA-2023:7510","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7510"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7511","reference_id":"RHSA-2023:7511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7512","reference_id":"RHSA-2023:7512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7547","reference_id":"RHSA-2023:7547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7569","reference_id":"RHSA-2023:7569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7570","reference_id":"RHSA-2023:7570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7573","reference_id":"RHSA-2023:7573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7574","reference_id":"RHSA-2023:7574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7577","reference_id":"RHSA-2023:7577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7577"},{"reference_url":"https://usn.ubuntu.com/6509-1/","reference_id":"USN-6509-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6509-1/"},{"reference_url":"https://usn.ubuntu.com/6515-1/","reference_id":"USN-6515-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6515-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/435516?format=json","purl":"pkg:apk/alpine/firefox-esr@115.5.0-r0?arch=x86&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.5.0-r0%3Farch=x86&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2023-6204"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fwr3-cgq1-a3b4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51429?format=json","vulnerability_id":"VCID-pybb-2ny2-quas","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6209.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6209.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6209","reference_id":"","reference_type":"","scores":[{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59334","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59371","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59352","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.5933","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59296","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.5932","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59284","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59348","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59367","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.5935","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59365","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250901","reference_id":"2250901","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250901"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49","reference_id":"mfsa2023-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50","reference_id":"mfsa2023-50","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52","reference_id":"mfsa2023-52","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7499","reference_id":"RHSA-2023:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7500","reference_id":"RHSA-2023:7500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7501","reference_id":"RHSA-2023:7501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7502","reference_id":"RHSA-2023:7502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7503","reference_id":"RHSA-2023:7503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7504","reference_id":"RHSA-2023:7504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7505","reference_id":"RHSA-2023:7505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7506","reference_id":"RHSA-2023:7506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7507","reference_id":"RHSA-2023:7507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7508","reference_id":"RHSA-2023:7508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7509","reference_id":"RHSA-2023:7509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7510","reference_id":"RHSA-2023:7510","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7510"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7511","reference_id":"RHSA-2023:7511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7512","reference_id":"RHSA-2023:7512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7547","reference_id":"RHSA-2023:7547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7569","reference_id":"RHSA-2023:7569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7570","reference_id":"RHSA-2023:7570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7573","reference_id":"RHSA-2023:7573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7574","reference_id":"RHSA-2023:7574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7577","reference_id":"RHSA-2023:7577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7577"},{"reference_url":"https://usn.ubuntu.com/6509-1/","reference_id":"USN-6509-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6509-1/"},{"reference_url":"https://usn.ubuntu.com/6515-1/","reference_id":"USN-6515-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6515-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/435516?format=json","purl":"pkg:apk/alpine/firefox-esr@115.5.0-r0?arch=x86&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.5.0-r0%3Farch=x86&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2023-6209"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pybb-2ny2-quas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51427?format=json","vulnerability_id":"VCID-tutg-2zzk-4uam","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6207.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6207.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6207","reference_id":"","reference_type":"","scores":[{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63932","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63915","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63922","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63934","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63852","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63836","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63887","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63904","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63917","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.6387","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63906","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250899","reference_id":"2250899","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250899"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49","reference_id":"mfsa2023-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50","reference_id":"mfsa2023-50","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52","reference_id":"mfsa2023-52","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7499","reference_id":"RHSA-2023:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7500","reference_id":"RHSA-2023:7500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7501","reference_id":"RHSA-2023:7501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7502","reference_id":"RHSA-2023:7502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7503","reference_id":"RHSA-2023:7503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7504","reference_id":"RHSA-2023:7504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7505","reference_id":"RHSA-2023:7505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7506","reference_id":"RHSA-2023:7506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7507","reference_id":"RHSA-2023:7507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7508","reference_id":"RHSA-2023:7508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7509","reference_id":"RHSA-2023:7509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7510","reference_id":"RHSA-2023:7510","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7510"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7511","reference_id":"RHSA-2023:7511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7512","reference_id":"RHSA-2023:7512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7547","reference_id":"RHSA-2023:7547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7569","reference_id":"RHSA-2023:7569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7570","reference_id":"RHSA-2023:7570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7573","reference_id":"RHSA-2023:7573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7574","reference_id":"RHSA-2023:7574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7577","reference_id":"RHSA-2023:7577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7577"},{"reference_url":"https://usn.ubuntu.com/6509-1/","reference_id":"USN-6509-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6509-1/"},{"reference_url":"https://usn.ubuntu.com/6515-1/","reference_id":"USN-6515-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6515-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/435516?format=json","purl":"pkg:apk/alpine/firefox-esr@115.5.0-r0?arch=x86&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.5.0-r0%3Farch=x86&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2023-6207"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tutg-2zzk-4uam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51428?format=json","vulnerability_id":"VCID-vma9-r6uy-p7c1","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6208.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6208.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6208","reference_id":"","reference_type":"","scores":[{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.64003","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63973","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63992","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.64004","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.6392","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63947","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63956","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63974","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63986","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63972","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63939","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63975","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63985","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250900","reference_id":"2250900","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250900"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49","reference_id":"mfsa2023-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50","reference_id":"mfsa2023-50","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52","reference_id":"mfsa2023-52","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7499","reference_id":"RHSA-2023:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7500","reference_id":"RHSA-2023:7500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7501","reference_id":"RHSA-2023:7501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7502","reference_id":"RHSA-2023:7502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7503","reference_id":"RHSA-2023:7503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7504","reference_id":"RHSA-2023:7504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7505","reference_id":"RHSA-2023:7505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7506","reference_id":"RHSA-2023:7506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7507","reference_id":"RHSA-2023:7507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7508","reference_id":"RHSA-2023:7508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7509","reference_id":"RHSA-2023:7509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7510","reference_id":"RHSA-2023:7510","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7510"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7511","reference_id":"RHSA-2023:7511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7512","reference_id":"RHSA-2023:7512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7547","reference_id":"RHSA-2023:7547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7569","reference_id":"RHSA-2023:7569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7570","reference_id":"RHSA-2023:7570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7573","reference_id":"RHSA-2023:7573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7574","reference_id":"RHSA-2023:7574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7577","reference_id":"RHSA-2023:7577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7577"},{"reference_url":"https://usn.ubuntu.com/6509-1/","reference_id":"USN-6509-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6509-1/"},{"reference_url":"https://usn.ubuntu.com/6515-1/","reference_id":"USN-6515-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6515-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/435516?format=json","purl":"pkg:apk/alpine/firefox-esr@115.5.0-r0?arch=x86&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.5.0-r0%3Farch=x86&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2023-6208"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vma9-r6uy-p7c1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51430?format=json","vulnerability_id":"VCID-yd2q-assr-v3er","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6212.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6212.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6212","reference_id":"","reference_type":"","scores":[{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59984","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59988","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60009","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59994","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59975","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60014","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60021","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60007","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59979","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59996","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59929","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59954","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59924","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250902","reference_id":"2250902","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250902"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1658432%2C1820983%2C1829252%2C1856072%2C1856091%2C1859030%2C1860943%2C1862782","reference_id":"buglist.cgi?bug_id=1658432%2C1820983%2C1829252%2C1856072%2C1856091%2C1859030%2C1860943%2C1862782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1658432%2C1820983%2C1829252%2C1856072%2C1856091%2C1859030%2C1860943%2C1862782"},{"reference_url":"https://www.debian.org/security/2023/dsa-5561","reference_id":"dsa-5561","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/"}],"url":"https://www.debian.org/security/2023/dsa-5561"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49","reference_id":"mfsa2023-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-49/","reference_id":"mfsa2023-49","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-49/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50","reference_id":"mfsa2023-50","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-50/","reference_id":"mfsa2023-50","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-50/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52","reference_id":"mfsa2023-52","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-52/","reference_id":"mfsa2023-52","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-52/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00030.html","reference_id":"msg00030.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00030.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7499","reference_id":"RHSA-2023:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7500","reference_id":"RHSA-2023:7500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7501","reference_id":"RHSA-2023:7501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7502","reference_id":"RHSA-2023:7502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7503","reference_id":"RHSA-2023:7503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7504","reference_id":"RHSA-2023:7504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7505","reference_id":"RHSA-2023:7505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7506","reference_id":"RHSA-2023:7506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7507","reference_id":"RHSA-2023:7507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7508","reference_id":"RHSA-2023:7508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7509","reference_id":"RHSA-2023:7509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7510","reference_id":"RHSA-2023:7510","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7510"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7511","reference_id":"RHSA-2023:7511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7512","reference_id":"RHSA-2023:7512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7547","reference_id":"RHSA-2023:7547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7569","reference_id":"RHSA-2023:7569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7570","reference_id":"RHSA-2023:7570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7573","reference_id":"RHSA-2023:7573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7574","reference_id":"RHSA-2023:7574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7577","reference_id":"RHSA-2023:7577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7577"},{"reference_url":"https://usn.ubuntu.com/6509-1/","reference_id":"USN-6509-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6509-1/"},{"reference_url":"https://usn.ubuntu.com/6515-1/","reference_id":"USN-6515-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6515-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/435516?format=json","purl":"pkg:apk/alpine/firefox-esr@115.5.0-r0?arch=x86&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.5.0-r0%3Farch=x86&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2023-6212"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yd2q-assr-v3er"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.5.0-r0%3Farch=x86&distroversion=v3.21&reponame=community"}