Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
Typeapk
Namespacealpine
Namefirefox-esr
Version60.6.1-r0
Qualifiers
arch x86
distroversion v3.20
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version60.7.0-r0
Latest_non_vulnerable_version115.17.0-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-7yw2-2r4n-rugg
vulnerability_id VCID-7yw2-2r4n-rugg
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird and
    Firefox, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9790.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9790.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9790
reference_id
reference_type
scores
0
value 0.00714
scoring_system epss
scoring_elements 0.72408
published_at 2026-04-29T12:55:00Z
1
value 0.00714
scoring_system epss
scoring_elements 0.72363
published_at 2026-04-16T12:55:00Z
2
value 0.00714
scoring_system epss
scoring_elements 0.72372
published_at 2026-04-18T12:55:00Z
3
value 0.00714
scoring_system epss
scoring_elements 0.7236
published_at 2026-04-21T12:55:00Z
4
value 0.00714
scoring_system epss
scoring_elements 0.72403
published_at 2026-04-24T12:55:00Z
5
value 0.00714
scoring_system epss
scoring_elements 0.72412
published_at 2026-04-26T12:55:00Z
6
value 0.00714
scoring_system epss
scoring_elements 0.72274
published_at 2026-04-01T12:55:00Z
7
value 0.00714
scoring_system epss
scoring_elements 0.7228
published_at 2026-04-02T12:55:00Z
8
value 0.00714
scoring_system epss
scoring_elements 0.72299
published_at 2026-04-04T12:55:00Z
9
value 0.00714
scoring_system epss
scoring_elements 0.72276
published_at 2026-04-07T12:55:00Z
10
value 0.00714
scoring_system epss
scoring_elements 0.72315
published_at 2026-04-08T12:55:00Z
11
value 0.00714
scoring_system epss
scoring_elements 0.72327
published_at 2026-04-09T12:55:00Z
12
value 0.00714
scoring_system epss
scoring_elements 0.7235
published_at 2026-04-11T12:55:00Z
13
value 0.00714
scoring_system epss
scoring_elements 0.72333
published_at 2026-04-12T12:55:00Z
14
value 0.00714
scoring_system epss
scoring_elements 0.72321
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9790
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1690675
reference_id 1690675
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1690675
12
reference_url https://security.archlinux.org/ASA-201903-11
reference_id ASA-201903-11
reference_type
scores
url https://security.archlinux.org/ASA-201903-11
13
reference_url https://security.archlinux.org/AVG-925
reference_id AVG-925
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-925
14
reference_url https://security.gentoo.org/glsa/201904-07
reference_id GLSA-201904-07
reference_type
scores
url https://security.gentoo.org/glsa/201904-07
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-07
reference_id mfsa2019-07
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-07
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-08
reference_id mfsa2019-08
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-08
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-11
reference_id mfsa2019-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-11
18
reference_url https://access.redhat.com/errata/RHSA-2019:0622
reference_id RHSA-2019:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0622
19
reference_url https://access.redhat.com/errata/RHSA-2019:0623
reference_id RHSA-2019:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0623
20
reference_url https://access.redhat.com/errata/RHSA-2019:0680
reference_id RHSA-2019:0680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0680
21
reference_url https://access.redhat.com/errata/RHSA-2019:0681
reference_id RHSA-2019:0681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0681
22
reference_url https://access.redhat.com/errata/RHSA-2019:0966
reference_id RHSA-2019:0966
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0966
23
reference_url https://access.redhat.com/errata/RHSA-2019:1144
reference_id RHSA-2019:1144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1144
24
reference_url https://usn.ubuntu.com/3918-1/
reference_id USN-3918-1
reference_type
scores
url https://usn.ubuntu.com/3918-1/
25
reference_url https://usn.ubuntu.com/3918-2/
reference_id USN-3918-2
reference_type
scores
url https://usn.ubuntu.com/3918-2/
26
reference_url https://usn.ubuntu.com/3927-1/
reference_id USN-3927-1
reference_type
scores
url https://usn.ubuntu.com/3927-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.6.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2019-9790
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7yw2-2r4n-rugg
1
url VCID-8rq6-26hu-m3gz
vulnerability_id VCID-8rq6-26hu-m3gz
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird and
    Firefox, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9813.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9813.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9813
reference_id
reference_type
scores
0
value 0.46675
scoring_system epss
scoring_elements 0.97678
published_at 2026-04-29T12:55:00Z
1
value 0.46675
scoring_system epss
scoring_elements 0.97662
published_at 2026-04-12T12:55:00Z
2
value 0.46675
scoring_system epss
scoring_elements 0.97663
published_at 2026-04-13T12:55:00Z
3
value 0.46675
scoring_system epss
scoring_elements 0.9767
published_at 2026-04-16T12:55:00Z
4
value 0.46675
scoring_system epss
scoring_elements 0.97673
published_at 2026-04-24T12:55:00Z
5
value 0.46675
scoring_system epss
scoring_elements 0.97672
published_at 2026-04-21T12:55:00Z
6
value 0.46675
scoring_system epss
scoring_elements 0.97674
published_at 2026-04-26T12:55:00Z
7
value 0.46675
scoring_system epss
scoring_elements 0.97642
published_at 2026-04-01T12:55:00Z
8
value 0.46675
scoring_system epss
scoring_elements 0.97649
published_at 2026-04-02T12:55:00Z
9
value 0.46675
scoring_system epss
scoring_elements 0.9765
published_at 2026-04-04T12:55:00Z
10
value 0.46675
scoring_system epss
scoring_elements 0.97651
published_at 2026-04-07T12:55:00Z
11
value 0.46675
scoring_system epss
scoring_elements 0.97655
published_at 2026-04-08T12:55:00Z
12
value 0.46675
scoring_system epss
scoring_elements 0.97658
published_at 2026-04-09T12:55:00Z
13
value 0.46675
scoring_system epss
scoring_elements 0.9766
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9813
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9810
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9813
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1692182
reference_id 1692182
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1692182
6
reference_url https://security.archlinux.org/ASA-201903-14
reference_id ASA-201903-14
reference_type
scores
url https://security.archlinux.org/ASA-201903-14
7
reference_url https://security.archlinux.org/ASA-201904-4
reference_id ASA-201904-4
reference_type
scores
url https://security.archlinux.org/ASA-201904-4
8
reference_url https://security.archlinux.org/AVG-930
reference_id AVG-930
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-930
9
reference_url https://security.archlinux.org/AVG-947
reference_id AVG-947
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-947
10
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1810
reference_id CVE-2019-9813
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1810
11
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46646.txt
reference_id CVE-2019-9813
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46646.txt
12
reference_url https://security.gentoo.org/glsa/201904-07
reference_id GLSA-201904-07
reference_type
scores
url https://security.gentoo.org/glsa/201904-07
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-09
reference_id mfsa2019-09
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-09
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-10
reference_id mfsa2019-10
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-10
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-12
reference_id mfsa2019-12
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-12
16
reference_url https://access.redhat.com/errata/RHSA-2019:0671
reference_id RHSA-2019:0671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0671
17
reference_url https://access.redhat.com/errata/RHSA-2019:0672
reference_id RHSA-2019:0672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0672
18
reference_url https://access.redhat.com/errata/RHSA-2019:0680
reference_id RHSA-2019:0680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0680
19
reference_url https://access.redhat.com/errata/RHSA-2019:0681
reference_id RHSA-2019:0681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0681
20
reference_url https://access.redhat.com/errata/RHSA-2019:0966
reference_id RHSA-2019:0966
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0966
21
reference_url https://access.redhat.com/errata/RHSA-2019:1144
reference_id RHSA-2019:1144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1144
22
reference_url https://usn.ubuntu.com/3919-1/
reference_id USN-3919-1
reference_type
scores
url https://usn.ubuntu.com/3919-1/
23
reference_url https://usn.ubuntu.com/3927-1/
reference_id USN-3927-1
reference_type
scores
url https://usn.ubuntu.com/3927-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.6.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2019-9813
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8rq6-26hu-m3gz
2
url VCID-a2k9-85qx-u7cy
vulnerability_id VCID-a2k9-85qx-u7cy
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird and
    Firefox, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9788.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9788.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9788
reference_id
reference_type
scores
0
value 0.02068
scoring_system epss
scoring_elements 0.83998
published_at 2026-04-29T12:55:00Z
1
value 0.02068
scoring_system epss
scoring_elements 0.83935
published_at 2026-04-13T12:55:00Z
2
value 0.02068
scoring_system epss
scoring_elements 0.83959
published_at 2026-04-18T12:55:00Z
3
value 0.02068
scoring_system epss
scoring_elements 0.83961
published_at 2026-04-21T12:55:00Z
4
value 0.02068
scoring_system epss
scoring_elements 0.83986
published_at 2026-04-24T12:55:00Z
5
value 0.02068
scoring_system epss
scoring_elements 0.83994
published_at 2026-04-26T12:55:00Z
6
value 0.02068
scoring_system epss
scoring_elements 0.83867
published_at 2026-04-01T12:55:00Z
7
value 0.02068
scoring_system epss
scoring_elements 0.83881
published_at 2026-04-02T12:55:00Z
8
value 0.02068
scoring_system epss
scoring_elements 0.83897
published_at 2026-04-04T12:55:00Z
9
value 0.02068
scoring_system epss
scoring_elements 0.83899
published_at 2026-04-07T12:55:00Z
10
value 0.02068
scoring_system epss
scoring_elements 0.83922
published_at 2026-04-08T12:55:00Z
11
value 0.02068
scoring_system epss
scoring_elements 0.83929
published_at 2026-04-09T12:55:00Z
12
value 0.02068
scoring_system epss
scoring_elements 0.83945
published_at 2026-04-11T12:55:00Z
13
value 0.02068
scoring_system epss
scoring_elements 0.83939
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9788
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1690674
reference_id 1690674
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1690674
12
reference_url https://security.archlinux.org/ASA-201903-11
reference_id ASA-201903-11
reference_type
scores
url https://security.archlinux.org/ASA-201903-11
13
reference_url https://security.archlinux.org/AVG-925
reference_id AVG-925
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-925
14
reference_url https://security.gentoo.org/glsa/201904-07
reference_id GLSA-201904-07
reference_type
scores
url https://security.gentoo.org/glsa/201904-07
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-07
reference_id mfsa2019-07
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-07
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-08
reference_id mfsa2019-08
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-08
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-11
reference_id mfsa2019-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-11
18
reference_url https://access.redhat.com/errata/RHSA-2019:0622
reference_id RHSA-2019:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0622
19
reference_url https://access.redhat.com/errata/RHSA-2019:0623
reference_id RHSA-2019:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0623
20
reference_url https://access.redhat.com/errata/RHSA-2019:0680
reference_id RHSA-2019:0680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0680
21
reference_url https://access.redhat.com/errata/RHSA-2019:0681
reference_id RHSA-2019:0681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0681
22
reference_url https://access.redhat.com/errata/RHSA-2019:0966
reference_id RHSA-2019:0966
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0966
23
reference_url https://access.redhat.com/errata/RHSA-2019:1144
reference_id RHSA-2019:1144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1144
24
reference_url https://usn.ubuntu.com/3918-1/
reference_id USN-3918-1
reference_type
scores
url https://usn.ubuntu.com/3918-1/
25
reference_url https://usn.ubuntu.com/3918-2/
reference_id USN-3918-2
reference_type
scores
url https://usn.ubuntu.com/3918-2/
26
reference_url https://usn.ubuntu.com/3927-1/
reference_id USN-3927-1
reference_type
scores
url https://usn.ubuntu.com/3927-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.6.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2019-9788
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a2k9-85qx-u7cy
3
url VCID-ax8a-z9s4-e3dk
vulnerability_id VCID-ax8a-z9s4-e3dk
summary A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is configured as the default URI handler for a given URI scheme in third party applications and these applications insufficiently sanitize URL data. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9794.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9794.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9794
reference_id
reference_type
scores
0
value 0.00419
scoring_system epss
scoring_elements 0.61895
published_at 2026-04-29T12:55:00Z
1
value 0.00419
scoring_system epss
scoring_elements 0.61907
published_at 2026-04-18T12:55:00Z
2
value 0.00419
scoring_system epss
scoring_elements 0.6189
published_at 2026-04-21T12:55:00Z
3
value 0.00419
scoring_system epss
scoring_elements 0.61885
published_at 2026-04-24T12:55:00Z
4
value 0.00419
scoring_system epss
scoring_elements 0.61903
published_at 2026-04-26T12:55:00Z
5
value 0.00419
scoring_system epss
scoring_elements 0.6173
published_at 2026-04-01T12:55:00Z
6
value 0.00419
scoring_system epss
scoring_elements 0.61804
published_at 2026-04-02T12:55:00Z
7
value 0.00419
scoring_system epss
scoring_elements 0.61834
published_at 2026-04-04T12:55:00Z
8
value 0.00419
scoring_system epss
scoring_elements 0.61805
published_at 2026-04-07T12:55:00Z
9
value 0.00419
scoring_system epss
scoring_elements 0.61854
published_at 2026-04-08T12:55:00Z
10
value 0.00419
scoring_system epss
scoring_elements 0.61869
published_at 2026-04-09T12:55:00Z
11
value 0.00419
scoring_system epss
scoring_elements 0.61891
published_at 2026-04-11T12:55:00Z
12
value 0.00419
scoring_system epss
scoring_elements 0.61879
published_at 2026-04-12T12:55:00Z
13
value 0.00419
scoring_system epss
scoring_elements 0.61859
published_at 2026-04-13T12:55:00Z
14
value 0.00419
scoring_system epss
scoring_elements 0.61902
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9794
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1690679
reference_id 1690679
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1690679
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-07
reference_id mfsa2019-07
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-07
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-08
reference_id mfsa2019-08
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-08
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-11
reference_id mfsa2019-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-11
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.6.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2019-9794
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ax8a-z9s4-e3dk
4
url VCID-ce3x-bw1m-jyf4
vulnerability_id VCID-ce3x-bw1m-jyf4
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird and
    Firefox, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18506.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18506.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18506
reference_id
reference_type
scores
0
value 0.0236
scoring_system epss
scoring_elements 0.8498
published_at 2026-04-29T12:55:00Z
1
value 0.0236
scoring_system epss
scoring_elements 0.84934
published_at 2026-04-11T12:55:00Z
2
value 0.0236
scoring_system epss
scoring_elements 0.84933
published_at 2026-04-12T12:55:00Z
3
value 0.0236
scoring_system epss
scoring_elements 0.84928
published_at 2026-04-13T12:55:00Z
4
value 0.0236
scoring_system epss
scoring_elements 0.8495
published_at 2026-04-18T12:55:00Z
5
value 0.0236
scoring_system epss
scoring_elements 0.84947
published_at 2026-04-21T12:55:00Z
6
value 0.0236
scoring_system epss
scoring_elements 0.84973
published_at 2026-04-24T12:55:00Z
7
value 0.0236
scoring_system epss
scoring_elements 0.84982
published_at 2026-04-26T12:55:00Z
8
value 0.0236
scoring_system epss
scoring_elements 0.84851
published_at 2026-04-01T12:55:00Z
9
value 0.0236
scoring_system epss
scoring_elements 0.84866
published_at 2026-04-02T12:55:00Z
10
value 0.0236
scoring_system epss
scoring_elements 0.84884
published_at 2026-04-04T12:55:00Z
11
value 0.0236
scoring_system epss
scoring_elements 0.84886
published_at 2026-04-07T12:55:00Z
12
value 0.0236
scoring_system epss
scoring_elements 0.84909
published_at 2026-04-08T12:55:00Z
13
value 0.0236
scoring_system epss
scoring_elements 0.84917
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18506
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://lists.debian.org/debian-lts-announce/2019/03/msg00024.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/03/msg00024.html
16
reference_url https://lists.debian.org/debian-lts-announce/2019/04/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/04/msg00000.html
17
reference_url https://seclists.org/bugtraq/2019/Apr/0
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Apr/0
18
reference_url https://seclists.org/bugtraq/2019/Mar/28
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Mar/28
19
reference_url https://www.debian.org/security/2019/dsa-4411
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4411
20
reference_url https://www.debian.org/security/2019/dsa-4420
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4420
21
reference_url https://www.mozilla.org/security/advisories/mfsa2019-01/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2019-01/
22
reference_url http://www.securityfocus.com/bid/106773
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106773
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1690673
reference_id 1690673
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1690673
24
reference_url https://security.archlinux.org/ASA-201902-2
reference_id ASA-201902-2
reference_type
scores
url https://security.archlinux.org/ASA-201902-2
25
reference_url https://security.archlinux.org/AVG-862
reference_id AVG-862
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-862
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-18506
reference_id CVE-2018-18506
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-18506
56
reference_url https://security.gentoo.org/glsa/201904-07
reference_id GLSA-201904-07
reference_type
scores
url https://security.gentoo.org/glsa/201904-07
57
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-01
reference_id mfsa2019-01
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-01
58
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-08
reference_id mfsa2019-08
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-08
59
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-11
reference_id mfsa2019-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-11
60
reference_url https://access.redhat.com/errata/RHSA-2019:0622
reference_id RHSA-2019:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0622
61
reference_url https://access.redhat.com/errata/RHSA-2019:0623
reference_id RHSA-2019:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0623
62
reference_url https://access.redhat.com/errata/RHSA-2019:0680
reference_id RHSA-2019:0680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0680
63
reference_url https://access.redhat.com/errata/RHSA-2019:0681
reference_id RHSA-2019:0681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0681
64
reference_url https://access.redhat.com/errata/RHSA-2019:0966
reference_id RHSA-2019:0966
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0966
65
reference_url https://access.redhat.com/errata/RHSA-2019:1144
reference_id RHSA-2019:1144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1144
66
reference_url https://usn.ubuntu.com/3874-1/
reference_id USN-3874-1
reference_type
scores
url https://usn.ubuntu.com/3874-1/
67
reference_url https://usn.ubuntu.com/3927-1/
reference_id USN-3927-1
reference_type
scores
url https://usn.ubuntu.com/3927-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.6.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2018-18506
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ce3x-bw1m-jyf4
5
url VCID-drcd-xhd2-27hn
vulnerability_id VCID-drcd-xhd2-27hn
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird and
    Firefox, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9793.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9793.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9793
reference_id
reference_type
scores
0
value 0.00402
scoring_system epss
scoring_elements 0.60858
published_at 2026-04-29T12:55:00Z
1
value 0.00402
scoring_system epss
scoring_elements 0.60875
published_at 2026-04-16T12:55:00Z
2
value 0.00402
scoring_system epss
scoring_elements 0.6088
published_at 2026-04-18T12:55:00Z
3
value 0.00402
scoring_system epss
scoring_elements 0.60864
published_at 2026-04-21T12:55:00Z
4
value 0.00402
scoring_system epss
scoring_elements 0.60853
published_at 2026-04-24T12:55:00Z
5
value 0.00402
scoring_system epss
scoring_elements 0.60866
published_at 2026-04-26T12:55:00Z
6
value 0.00402
scoring_system epss
scoring_elements 0.60713
published_at 2026-04-01T12:55:00Z
7
value 0.00402
scoring_system epss
scoring_elements 0.60785
published_at 2026-04-02T12:55:00Z
8
value 0.00402
scoring_system epss
scoring_elements 0.60814
published_at 2026-04-04T12:55:00Z
9
value 0.00402
scoring_system epss
scoring_elements 0.60778
published_at 2026-04-07T12:55:00Z
10
value 0.00402
scoring_system epss
scoring_elements 0.60827
published_at 2026-04-08T12:55:00Z
11
value 0.00402
scoring_system epss
scoring_elements 0.60844
published_at 2026-04-09T12:55:00Z
12
value 0.00402
scoring_system epss
scoring_elements 0.60865
published_at 2026-04-11T12:55:00Z
13
value 0.00402
scoring_system epss
scoring_elements 0.60851
published_at 2026-04-12T12:55:00Z
14
value 0.00402
scoring_system epss
scoring_elements 0.60833
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9793
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1690678
reference_id 1690678
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1690678
12
reference_url https://security.archlinux.org/ASA-201903-11
reference_id ASA-201903-11
reference_type
scores
url https://security.archlinux.org/ASA-201903-11
13
reference_url https://security.archlinux.org/AVG-925
reference_id AVG-925
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-925
14
reference_url https://security.gentoo.org/glsa/201904-07
reference_id GLSA-201904-07
reference_type
scores
url https://security.gentoo.org/glsa/201904-07
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-07
reference_id mfsa2019-07
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-07
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-08
reference_id mfsa2019-08
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-08
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-11
reference_id mfsa2019-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-11
18
reference_url https://access.redhat.com/errata/RHSA-2019:0622
reference_id RHSA-2019:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0622
19
reference_url https://access.redhat.com/errata/RHSA-2019:0623
reference_id RHSA-2019:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0623
20
reference_url https://access.redhat.com/errata/RHSA-2019:0680
reference_id RHSA-2019:0680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0680
21
reference_url https://access.redhat.com/errata/RHSA-2019:0681
reference_id RHSA-2019:0681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0681
22
reference_url https://access.redhat.com/errata/RHSA-2019:0966
reference_id RHSA-2019:0966
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0966
23
reference_url https://access.redhat.com/errata/RHSA-2019:1144
reference_id RHSA-2019:1144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1144
24
reference_url https://usn.ubuntu.com/3918-1/
reference_id USN-3918-1
reference_type
scores
url https://usn.ubuntu.com/3918-1/
25
reference_url https://usn.ubuntu.com/3918-2/
reference_id USN-3918-2
reference_type
scores
url https://usn.ubuntu.com/3918-2/
26
reference_url https://usn.ubuntu.com/3927-1/
reference_id USN-3927-1
reference_type
scores
url https://usn.ubuntu.com/3927-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.6.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2019-9793
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-drcd-xhd2-27hn
6
url VCID-rhzx-ha7x-dfew
vulnerability_id VCID-rhzx-ha7x-dfew
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird and
    Firefox, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9791.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9791.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9791
reference_id
reference_type
scores
0
value 0.38066
scoring_system epss
scoring_elements 0.97233
published_at 2026-04-29T12:55:00Z
1
value 0.38066
scoring_system epss
scoring_elements 0.97217
published_at 2026-04-13T12:55:00Z
2
value 0.38066
scoring_system epss
scoring_elements 0.97225
published_at 2026-04-16T12:55:00Z
3
value 0.38066
scoring_system epss
scoring_elements 0.97228
published_at 2026-04-18T12:55:00Z
4
value 0.38066
scoring_system epss
scoring_elements 0.97231
published_at 2026-04-24T12:55:00Z
5
value 0.38066
scoring_system epss
scoring_elements 0.97232
published_at 2026-04-26T12:55:00Z
6
value 0.38066
scoring_system epss
scoring_elements 0.97188
published_at 2026-04-01T12:55:00Z
7
value 0.38066
scoring_system epss
scoring_elements 0.97194
published_at 2026-04-02T12:55:00Z
8
value 0.38066
scoring_system epss
scoring_elements 0.972
published_at 2026-04-04T12:55:00Z
9
value 0.38066
scoring_system epss
scoring_elements 0.97201
published_at 2026-04-07T12:55:00Z
10
value 0.38066
scoring_system epss
scoring_elements 0.97211
published_at 2026-04-08T12:55:00Z
11
value 0.38066
scoring_system epss
scoring_elements 0.97212
published_at 2026-04-09T12:55:00Z
12
value 0.38066
scoring_system epss
scoring_elements 0.97216
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9791
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1690676
reference_id 1690676
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1690676
12
reference_url https://security.archlinux.org/ASA-201903-11
reference_id ASA-201903-11
reference_type
scores
url https://security.archlinux.org/ASA-201903-11
13
reference_url https://security.archlinux.org/AVG-925
reference_id AVG-925
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-925
14
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1791
reference_id CVE-2019-9791
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1791
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46613.js
reference_id CVE-2019-9791
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46613.js
16
reference_url https://security.gentoo.org/glsa/201904-07
reference_id GLSA-201904-07
reference_type
scores
url https://security.gentoo.org/glsa/201904-07
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-07
reference_id mfsa2019-07
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-07
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-08
reference_id mfsa2019-08
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-08
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-11
reference_id mfsa2019-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-11
20
reference_url https://access.redhat.com/errata/RHSA-2019:0622
reference_id RHSA-2019:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0622
21
reference_url https://access.redhat.com/errata/RHSA-2019:0623
reference_id RHSA-2019:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0623
22
reference_url https://access.redhat.com/errata/RHSA-2019:0680
reference_id RHSA-2019:0680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0680
23
reference_url https://access.redhat.com/errata/RHSA-2019:0681
reference_id RHSA-2019:0681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0681
24
reference_url https://access.redhat.com/errata/RHSA-2019:0966
reference_id RHSA-2019:0966
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0966
25
reference_url https://access.redhat.com/errata/RHSA-2019:1144
reference_id RHSA-2019:1144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1144
26
reference_url https://usn.ubuntu.com/3918-1/
reference_id USN-3918-1
reference_type
scores
url https://usn.ubuntu.com/3918-1/
27
reference_url https://usn.ubuntu.com/3918-2/
reference_id USN-3918-2
reference_type
scores
url https://usn.ubuntu.com/3918-2/
28
reference_url https://usn.ubuntu.com/3927-1/
reference_id USN-3927-1
reference_type
scores
url https://usn.ubuntu.com/3927-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.6.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2019-9791
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rhzx-ha7x-dfew
7
url VCID-sk9f-516d-xqh7
vulnerability_id VCID-sk9f-516d-xqh7
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird and
    Firefox, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9810.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9810.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9810
reference_id
reference_type
scores
0
value 0.7161
scoring_system epss
scoring_elements 0.98742
published_at 2026-04-29T12:55:00Z
1
value 0.7161
scoring_system epss
scoring_elements 0.98731
published_at 2026-04-11T12:55:00Z
2
value 0.7161
scoring_system epss
scoring_elements 0.98732
published_at 2026-04-13T12:55:00Z
3
value 0.7161
scoring_system epss
scoring_elements 0.98735
published_at 2026-04-16T12:55:00Z
4
value 0.7161
scoring_system epss
scoring_elements 0.98736
published_at 2026-04-21T12:55:00Z
5
value 0.7161
scoring_system epss
scoring_elements 0.9874
published_at 2026-04-24T12:55:00Z
6
value 0.7161
scoring_system epss
scoring_elements 0.98741
published_at 2026-04-26T12:55:00Z
7
value 0.7161
scoring_system epss
scoring_elements 0.98721
published_at 2026-04-02T12:55:00Z
8
value 0.7161
scoring_system epss
scoring_elements 0.98725
published_at 2026-04-04T12:55:00Z
9
value 0.7161
scoring_system epss
scoring_elements 0.98729
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9810
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9810
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9813
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1692181
reference_id 1692181
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1692181
6
reference_url https://security.archlinux.org/ASA-201903-14
reference_id ASA-201903-14
reference_type
scores
url https://security.archlinux.org/ASA-201903-14
7
reference_url https://security.archlinux.org/ASA-201904-4
reference_id ASA-201904-4
reference_type
scores
url https://security.archlinux.org/ASA-201904-4
8
reference_url https://security.archlinux.org/AVG-930
reference_id AVG-930
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-930
9
reference_url https://security.archlinux.org/AVG-947
reference_id AVG-947
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-947
10
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46605.html
reference_id CVE-2019-9810
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46605.html
11
reference_url https://security.gentoo.org/glsa/201904-07
reference_id GLSA-201904-07
reference_type
scores
url https://security.gentoo.org/glsa/201904-07
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-09
reference_id mfsa2019-09
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-09
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-10
reference_id mfsa2019-10
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-10
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-12
reference_id mfsa2019-12
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-12
15
reference_url https://access.redhat.com/errata/RHSA-2019:0671
reference_id RHSA-2019:0671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0671
16
reference_url https://access.redhat.com/errata/RHSA-2019:0672
reference_id RHSA-2019:0672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0672
17
reference_url https://access.redhat.com/errata/RHSA-2019:0680
reference_id RHSA-2019:0680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0680
18
reference_url https://access.redhat.com/errata/RHSA-2019:0681
reference_id RHSA-2019:0681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0681
19
reference_url https://access.redhat.com/errata/RHSA-2019:0966
reference_id RHSA-2019:0966
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0966
20
reference_url https://access.redhat.com/errata/RHSA-2019:1144
reference_id RHSA-2019:1144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1144
21
reference_url https://usn.ubuntu.com/3919-1/
reference_id USN-3919-1
reference_type
scores
url https://usn.ubuntu.com/3919-1/
22
reference_url https://usn.ubuntu.com/3927-1/
reference_id USN-3927-1
reference_type
scores
url https://usn.ubuntu.com/3927-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.6.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2019-9810
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sk9f-516d-xqh7
8
url VCID-uuc6-a3xx-6khk
vulnerability_id VCID-uuc6-a3xx-6khk
summary Firefox will accept any registered Program ID as an external protocol handler and offer to launch this local application when given a matching URL on Windows operating systems. This should only happen if the program has specifically registered itself as a "URL Handler" in the Windows registry. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9801.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9801.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9801
reference_id
reference_type
scores
0
value 0.00368
scoring_system epss
scoring_elements 0.58742
published_at 2026-04-29T12:55:00Z
1
value 0.00368
scoring_system epss
scoring_elements 0.58775
published_at 2026-04-21T12:55:00Z
2
value 0.00368
scoring_system epss
scoring_elements 0.58743
published_at 2026-04-24T12:55:00Z
3
value 0.00368
scoring_system epss
scoring_elements 0.58758
published_at 2026-04-26T12:55:00Z
4
value 0.00368
scoring_system epss
scoring_elements 0.58647
published_at 2026-04-01T12:55:00Z
5
value 0.00368
scoring_system epss
scoring_elements 0.58731
published_at 2026-04-02T12:55:00Z
6
value 0.00368
scoring_system epss
scoring_elements 0.58752
published_at 2026-04-04T12:55:00Z
7
value 0.00368
scoring_system epss
scoring_elements 0.5872
published_at 2026-04-07T12:55:00Z
8
value 0.00368
scoring_system epss
scoring_elements 0.58772
published_at 2026-04-08T12:55:00Z
9
value 0.00368
scoring_system epss
scoring_elements 0.58779
published_at 2026-04-12T12:55:00Z
10
value 0.00368
scoring_system epss
scoring_elements 0.58798
published_at 2026-04-11T12:55:00Z
11
value 0.00368
scoring_system epss
scoring_elements 0.58759
published_at 2026-04-13T12:55:00Z
12
value 0.00368
scoring_system epss
scoring_elements 0.58792
published_at 2026-04-16T12:55:00Z
13
value 0.00368
scoring_system epss
scoring_elements 0.58797
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9801
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1690682
reference_id 1690682
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1690682
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-07
reference_id mfsa2019-07
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-07
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-08
reference_id mfsa2019-08
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-08
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-11
reference_id mfsa2019-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-11
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.6.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2019-9801
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uuc6-a3xx-6khk
9
url VCID-vrvn-krwb-d3dr
vulnerability_id VCID-vrvn-krwb-d3dr
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird and
    Firefox, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9795.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9795.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9795
reference_id
reference_type
scores
0
value 0.00714
scoring_system epss
scoring_elements 0.72408
published_at 2026-04-29T12:55:00Z
1
value 0.00714
scoring_system epss
scoring_elements 0.72363
published_at 2026-04-16T12:55:00Z
2
value 0.00714
scoring_system epss
scoring_elements 0.72372
published_at 2026-04-18T12:55:00Z
3
value 0.00714
scoring_system epss
scoring_elements 0.7236
published_at 2026-04-21T12:55:00Z
4
value 0.00714
scoring_system epss
scoring_elements 0.72403
published_at 2026-04-24T12:55:00Z
5
value 0.00714
scoring_system epss
scoring_elements 0.72412
published_at 2026-04-26T12:55:00Z
6
value 0.00714
scoring_system epss
scoring_elements 0.72274
published_at 2026-04-01T12:55:00Z
7
value 0.00714
scoring_system epss
scoring_elements 0.7228
published_at 2026-04-02T12:55:00Z
8
value 0.00714
scoring_system epss
scoring_elements 0.72299
published_at 2026-04-04T12:55:00Z
9
value 0.00714
scoring_system epss
scoring_elements 0.72276
published_at 2026-04-07T12:55:00Z
10
value 0.00714
scoring_system epss
scoring_elements 0.72315
published_at 2026-04-08T12:55:00Z
11
value 0.00714
scoring_system epss
scoring_elements 0.72327
published_at 2026-04-09T12:55:00Z
12
value 0.00714
scoring_system epss
scoring_elements 0.7235
published_at 2026-04-11T12:55:00Z
13
value 0.00714
scoring_system epss
scoring_elements 0.72333
published_at 2026-04-12T12:55:00Z
14
value 0.00714
scoring_system epss
scoring_elements 0.72321
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9795
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1690680
reference_id 1690680
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1690680
12
reference_url https://security.archlinux.org/ASA-201903-11
reference_id ASA-201903-11
reference_type
scores
url https://security.archlinux.org/ASA-201903-11
13
reference_url https://security.archlinux.org/AVG-925
reference_id AVG-925
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-925
14
reference_url https://security.gentoo.org/glsa/201904-07
reference_id GLSA-201904-07
reference_type
scores
url https://security.gentoo.org/glsa/201904-07
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-07
reference_id mfsa2019-07
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-07
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-08
reference_id mfsa2019-08
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-08
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-11
reference_id mfsa2019-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-11
18
reference_url https://access.redhat.com/errata/RHSA-2019:0622
reference_id RHSA-2019:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0622
19
reference_url https://access.redhat.com/errata/RHSA-2019:0623
reference_id RHSA-2019:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0623
20
reference_url https://access.redhat.com/errata/RHSA-2019:0680
reference_id RHSA-2019:0680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0680
21
reference_url https://access.redhat.com/errata/RHSA-2019:0681
reference_id RHSA-2019:0681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0681
22
reference_url https://access.redhat.com/errata/RHSA-2019:0966
reference_id RHSA-2019:0966
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0966
23
reference_url https://access.redhat.com/errata/RHSA-2019:1144
reference_id RHSA-2019:1144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1144
24
reference_url https://usn.ubuntu.com/3918-1/
reference_id USN-3918-1
reference_type
scores
url https://usn.ubuntu.com/3918-1/
25
reference_url https://usn.ubuntu.com/3918-2/
reference_id USN-3918-2
reference_type
scores
url https://usn.ubuntu.com/3918-2/
26
reference_url https://usn.ubuntu.com/3927-1/
reference_id USN-3927-1
reference_type
scores
url https://usn.ubuntu.com/3927-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.6.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2019-9795
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vrvn-krwb-d3dr
10
url VCID-wwck-cpa8-y3c5
vulnerability_id VCID-wwck-cpa8-y3c5
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird and
    Firefox, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9792.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9792.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9792
reference_id
reference_type
scores
0
value 0.18866
scoring_system epss
scoring_elements 0.95322
published_at 2026-04-29T12:55:00Z
1
value 0.18866
scoring_system epss
scoring_elements 0.95309
published_at 2026-04-16T12:55:00Z
2
value 0.18866
scoring_system epss
scoring_elements 0.95313
published_at 2026-04-18T12:55:00Z
3
value 0.18866
scoring_system epss
scoring_elements 0.95317
published_at 2026-04-21T12:55:00Z
4
value 0.18866
scoring_system epss
scoring_elements 0.95318
published_at 2026-04-24T12:55:00Z
5
value 0.18866
scoring_system epss
scoring_elements 0.9532
published_at 2026-04-26T12:55:00Z
6
value 0.18866
scoring_system epss
scoring_elements 0.95263
published_at 2026-04-01T12:55:00Z
7
value 0.18866
scoring_system epss
scoring_elements 0.95274
published_at 2026-04-02T12:55:00Z
8
value 0.18866
scoring_system epss
scoring_elements 0.95279
published_at 2026-04-04T12:55:00Z
9
value 0.18866
scoring_system epss
scoring_elements 0.95284
published_at 2026-04-07T12:55:00Z
10
value 0.18866
scoring_system epss
scoring_elements 0.95292
published_at 2026-04-08T12:55:00Z
11
value 0.18866
scoring_system epss
scoring_elements 0.95295
published_at 2026-04-09T12:55:00Z
12
value 0.18866
scoring_system epss
scoring_elements 0.953
published_at 2026-04-12T12:55:00Z
13
value 0.18866
scoring_system epss
scoring_elements 0.95302
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9792
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1690677
reference_id 1690677
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1690677
12
reference_url https://security.archlinux.org/ASA-201903-11
reference_id ASA-201903-11
reference_type
scores
url https://security.archlinux.org/ASA-201903-11
13
reference_url https://security.archlinux.org/AVG-925
reference_id AVG-925
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-925
14
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1794
reference_id CVE-2019-9792
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1794
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46939.txt
reference_id CVE-2019-9792
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46939.txt
16
reference_url https://security.gentoo.org/glsa/201904-07
reference_id GLSA-201904-07
reference_type
scores
url https://security.gentoo.org/glsa/201904-07
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-07
reference_id mfsa2019-07
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-07
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-08
reference_id mfsa2019-08
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-08
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-11
reference_id mfsa2019-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-11
20
reference_url https://access.redhat.com/errata/RHSA-2019:0622
reference_id RHSA-2019:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0622
21
reference_url https://access.redhat.com/errata/RHSA-2019:0623
reference_id RHSA-2019:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0623
22
reference_url https://access.redhat.com/errata/RHSA-2019:0680
reference_id RHSA-2019:0680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0680
23
reference_url https://access.redhat.com/errata/RHSA-2019:0681
reference_id RHSA-2019:0681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0681
24
reference_url https://access.redhat.com/errata/RHSA-2019:0966
reference_id RHSA-2019:0966
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0966
25
reference_url https://access.redhat.com/errata/RHSA-2019:1144
reference_id RHSA-2019:1144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1144
26
reference_url https://usn.ubuntu.com/3918-1/
reference_id USN-3918-1
reference_type
scores
url https://usn.ubuntu.com/3918-1/
27
reference_url https://usn.ubuntu.com/3918-2/
reference_id USN-3918-2
reference_type
scores
url https://usn.ubuntu.com/3918-2/
28
reference_url https://usn.ubuntu.com/3927-1/
reference_id USN-3927-1
reference_type
scores
url https://usn.ubuntu.com/3927-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.6.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2019-9792
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wwck-cpa8-y3c5
11
url VCID-x4sm-zyc1-ffd4
vulnerability_id VCID-x4sm-zyc1-ffd4
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird and
    Firefox, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9796.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9796.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9796
reference_id
reference_type
scores
0
value 0.00714
scoring_system epss
scoring_elements 0.72408
published_at 2026-04-29T12:55:00Z
1
value 0.00714
scoring_system epss
scoring_elements 0.72363
published_at 2026-04-16T12:55:00Z
2
value 0.00714
scoring_system epss
scoring_elements 0.72372
published_at 2026-04-18T12:55:00Z
3
value 0.00714
scoring_system epss
scoring_elements 0.7236
published_at 2026-04-21T12:55:00Z
4
value 0.00714
scoring_system epss
scoring_elements 0.72403
published_at 2026-04-24T12:55:00Z
5
value 0.00714
scoring_system epss
scoring_elements 0.72412
published_at 2026-04-26T12:55:00Z
6
value 0.00714
scoring_system epss
scoring_elements 0.72274
published_at 2026-04-01T12:55:00Z
7
value 0.00714
scoring_system epss
scoring_elements 0.7228
published_at 2026-04-02T12:55:00Z
8
value 0.00714
scoring_system epss
scoring_elements 0.72299
published_at 2026-04-04T12:55:00Z
9
value 0.00714
scoring_system epss
scoring_elements 0.72276
published_at 2026-04-07T12:55:00Z
10
value 0.00714
scoring_system epss
scoring_elements 0.72315
published_at 2026-04-08T12:55:00Z
11
value 0.00714
scoring_system epss
scoring_elements 0.72327
published_at 2026-04-09T12:55:00Z
12
value 0.00714
scoring_system epss
scoring_elements 0.7235
published_at 2026-04-11T12:55:00Z
13
value 0.00714
scoring_system epss
scoring_elements 0.72333
published_at 2026-04-12T12:55:00Z
14
value 0.00714
scoring_system epss
scoring_elements 0.72321
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9796
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1690681
reference_id 1690681
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1690681
12
reference_url https://security.archlinux.org/ASA-201903-11
reference_id ASA-201903-11
reference_type
scores
url https://security.archlinux.org/ASA-201903-11
13
reference_url https://security.archlinux.org/AVG-925
reference_id AVG-925
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-925
14
reference_url https://security.gentoo.org/glsa/201904-07
reference_id GLSA-201904-07
reference_type
scores
url https://security.gentoo.org/glsa/201904-07
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-07
reference_id mfsa2019-07
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-07
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-08
reference_id mfsa2019-08
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-08
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-11
reference_id mfsa2019-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-11
18
reference_url https://access.redhat.com/errata/RHSA-2019:0622
reference_id RHSA-2019:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0622
19
reference_url https://access.redhat.com/errata/RHSA-2019:0623
reference_id RHSA-2019:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0623
20
reference_url https://access.redhat.com/errata/RHSA-2019:0680
reference_id RHSA-2019:0680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0680
21
reference_url https://access.redhat.com/errata/RHSA-2019:0681
reference_id RHSA-2019:0681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0681
22
reference_url https://access.redhat.com/errata/RHSA-2019:0966
reference_id RHSA-2019:0966
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0966
23
reference_url https://access.redhat.com/errata/RHSA-2019:1144
reference_id RHSA-2019:1144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1144
24
reference_url https://usn.ubuntu.com/3918-1/
reference_id USN-3918-1
reference_type
scores
url https://usn.ubuntu.com/3918-1/
25
reference_url https://usn.ubuntu.com/3918-2/
reference_id USN-3918-2
reference_type
scores
url https://usn.ubuntu.com/3918-2/
26
reference_url https://usn.ubuntu.com/3927-1/
reference_id USN-3927-1
reference_type
scores
url https://usn.ubuntu.com/3927-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox-esr@60.6.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.6.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2019-9796
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x4sm-zyc1-ffd4
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.6.1-r0%3Farch=x86&distroversion=v3.20&reponame=community