{"url":"http://public2.vulnerablecode.io/api/packages/464318?format=json","purl":"pkg:apk/alpine/firefox-esr@68.3.0-r0?arch=armhf&distroversion=v3.23&reponame=community","type":"apk","namespace":"alpine","name":"firefox-esr","version":"68.3.0-r0","qualifiers":{"arch":"armhf","distroversion":"v3.23","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"68.4.1-r0","latest_non_vulnerable_version":"115.6.0-r0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31932?format=json","vulnerability_id":"VCID-3smq-ax5u-ryd3","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17012.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17012.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17012","reference_id":"","reference_type":"","scores":[{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84318","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84253","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84275","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84276","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.8428","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84304","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84314","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84183","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84196","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84214","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84215","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84237","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84243","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84261","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84256","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779437","reference_id":"1779437","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779437"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/ASA-201912-2","reference_id":"ASA-201912-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-2"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://security.archlinux.org/AVG-1072","reference_id":"AVG-1072","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1072"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4107","reference_id":"RHSA-2019:4107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4108","reference_id":"RHSA-2019:4108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4111","reference_id":"RHSA-2019:4111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4148","reference_id":"RHSA-2019:4148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4195","reference_id":"RHSA-2019:4195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4205","reference_id":"RHSA-2019:4205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4216-1/","reference_id":"USN-4216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-1/"},{"reference_url":"https://usn.ubuntu.com/4216-2/","reference_id":"USN-4216-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-2/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/464318?format=json","purl":"pkg:apk/alpine/firefox-esr@68.3.0-r0?arch=armhf&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@68.3.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2019-17012"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3smq-ax5u-ryd3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63338?format=json","vulnerability_id":"VCID-4sv2-j8zg-xkhf","summary":"When running, the updater service wrote status and log files to an unrestricted location; potentially allowing an unprivileged process to locate and exploit a vulnerability in file handling in the updater service. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17009.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17009.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17009","reference_id":"","reference_type":"","scores":[{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.3435","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34742","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34727","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34687","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34455","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34436","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34579","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34792","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34818","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34695","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34738","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34766","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.3477","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34708","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17009"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779433","reference_id":"1779433","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779433"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/464318?format=json","purl":"pkg:apk/alpine/firefox-esr@68.3.0-r0?arch=armhf&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@68.3.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2019-17009"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4sv2-j8zg-xkhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31928?format=json","vulnerability_id":"VCID-ex1b-2rdy-7qhw","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17005.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17005.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17005","reference_id":"","reference_type":"","scores":[{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86303","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86264","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.8626","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86276","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86281","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86274","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86293","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86199","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86209","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86222","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86223","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86241","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86253","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86267","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779435","reference_id":"1779435","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779435"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/ASA-201912-2","reference_id":"ASA-201912-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-2"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://security.archlinux.org/AVG-1072","reference_id":"AVG-1072","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1072"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4107","reference_id":"RHSA-2019:4107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4108","reference_id":"RHSA-2019:4108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4111","reference_id":"RHSA-2019:4111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4148","reference_id":"RHSA-2019:4148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4195","reference_id":"RHSA-2019:4195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4205","reference_id":"RHSA-2019:4205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4216-1/","reference_id":"USN-4216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-1/"},{"reference_url":"https://usn.ubuntu.com/4216-2/","reference_id":"USN-4216-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-2/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/464318?format=json","purl":"pkg:apk/alpine/firefox-esr@68.3.0-r0?arch=armhf&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@68.3.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2019-17005"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ex1b-2rdy-7qhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31929?format=json","vulnerability_id":"VCID-pws7-8qmm-hfes","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17008.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17008.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17008","reference_id":"","reference_type":"","scores":[{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.75018","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74936","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74973","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.7498","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74972","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.75009","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.75015","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74896","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74897","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74925","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74899","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74968","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74946","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779431","reference_id":"1779431","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779431"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/ASA-201912-2","reference_id":"ASA-201912-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-2"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://security.archlinux.org/AVG-1072","reference_id":"AVG-1072","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1072"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4107","reference_id":"RHSA-2019:4107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4108","reference_id":"RHSA-2019:4108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4111","reference_id":"RHSA-2019:4111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4148","reference_id":"RHSA-2019:4148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4195","reference_id":"RHSA-2019:4195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4205","reference_id":"RHSA-2019:4205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4216-1/","reference_id":"USN-4216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-1/"},{"reference_url":"https://usn.ubuntu.com/4216-2/","reference_id":"USN-4216-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-2/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/464318?format=json","purl":"pkg:apk/alpine/firefox-esr@68.3.0-r0?arch=armhf&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@68.3.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2019-17008"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pws7-8qmm-hfes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31931?format=json","vulnerability_id":"VCID-zh2m-qyw5-dkgn","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17011.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17011.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17011","reference_id":"","reference_type":"","scores":[{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.8002","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79947","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79939","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79967","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.7997","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79998","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80004","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79891","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79898","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79919","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79907","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79935","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79943","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79963","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779436","reference_id":"1779436","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779436"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/ASA-201912-2","reference_id":"ASA-201912-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-2"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://security.archlinux.org/AVG-1072","reference_id":"AVG-1072","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1072"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4107","reference_id":"RHSA-2019:4107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4108","reference_id":"RHSA-2019:4108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4111","reference_id":"RHSA-2019:4111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4148","reference_id":"RHSA-2019:4148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4195","reference_id":"RHSA-2019:4195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4205","reference_id":"RHSA-2019:4205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4216-1/","reference_id":"USN-4216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-1/"},{"reference_url":"https://usn.ubuntu.com/4216-2/","reference_id":"USN-4216-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-2/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/464318?format=json","purl":"pkg:apk/alpine/firefox-esr@68.3.0-r0?arch=armhf&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@68.3.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2019-17011"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zh2m-qyw5-dkgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31930?format=json","vulnerability_id":"VCID-zstj-sux9-ubdd","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17010.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17010.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17010","reference_id":"","reference_type":"","scores":[{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.8002","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79947","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79939","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79967","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.7997","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79998","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80004","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79891","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79898","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79919","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79907","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79935","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79943","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79963","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779434","reference_id":"1779434","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779434"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/ASA-201912-2","reference_id":"ASA-201912-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-2"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://security.archlinux.org/AVG-1072","reference_id":"AVG-1072","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1072"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4107","reference_id":"RHSA-2019:4107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4108","reference_id":"RHSA-2019:4108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4111","reference_id":"RHSA-2019:4111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4148","reference_id":"RHSA-2019:4148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4195","reference_id":"RHSA-2019:4195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4205","reference_id":"RHSA-2019:4205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4216-1/","reference_id":"USN-4216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-1/"},{"reference_url":"https://usn.ubuntu.com/4216-2/","reference_id":"USN-4216-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-2/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/464318?format=json","purl":"pkg:apk/alpine/firefox-esr@68.3.0-r0?arch=armhf&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@68.3.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2019-17010"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zstj-sux9-ubdd"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@68.3.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community"}