{"url":"http://public2.vulnerablecode.io/api/packages/478753?format=json","purl":"pkg:apk/alpine/firefox-esr@115.0-r0?arch=x86_64&distroversion=edge&reponame=community","type":"apk","namespace":"alpine","name":"firefox-esr","version":"115.0-r0","qualifiers":{"arch":"x86_64","distroversion":"edge","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"115.0.2-r0","latest_non_vulnerable_version":"115.6.0-r0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61511?format=json","vulnerability_id":"VCID-3d1e-hqg2-zbbm","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37210","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32609","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32692","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38987","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38958","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.3897","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38951","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38868","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38705","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38978","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38909","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38962","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38976","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.3895","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38923","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37210"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-22/","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:25:23Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-22/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1821886","reference_id":"show_bug.cgi?id=1821886","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:25:23Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1821886"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/478753?format=json","purl":"pkg:apk/alpine/firefox-esr@115.0-r0?arch=x86_64&distroversion=edge&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.0-r0%3Farch=x86_64&distroversion=edge&reponame=community"}],"aliases":["CVE-2023-37210"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3d1e-hqg2-zbbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51443?format=json","vulnerability_id":"VCID-52ha-qvpu-ruc8","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37208.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37208.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37208","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13673","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13783","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13867","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13919","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13876","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13839","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13791","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13701","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13695","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13767","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13789","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13757","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13924","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1398","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219750","reference_id":"2219750","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219750"},{"reference_url":"https://www.debian.org/security/2023/dsa-5450","reference_id":"dsa-5450","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://www.debian.org/security/2023/dsa-5450"},{"reference_url":"https://www.debian.org/security/2023/dsa-5451","reference_id":"dsa-5451","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://www.debian.org/security/2023/dsa-5451"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-22/","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-22/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-23/","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-23/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-24/","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-24/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4062","reference_id":"RHSA-2023:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4063","reference_id":"RHSA-2023:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4064","reference_id":"RHSA-2023:4064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4065","reference_id":"RHSA-2023:4065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4066","reference_id":"RHSA-2023:4066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4067","reference_id":"RHSA-2023:4067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4068","reference_id":"RHSA-2023:4068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4069","reference_id":"RHSA-2023:4069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4070","reference_id":"RHSA-2023:4070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4071","reference_id":"RHSA-2023:4071","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4071"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4072","reference_id":"RHSA-2023:4072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4073","reference_id":"RHSA-2023:4073","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4073"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4074","reference_id":"RHSA-2023:4074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4075","reference_id":"RHSA-2023:4075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4076","reference_id":"RHSA-2023:4076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4079","reference_id":"RHSA-2023:4079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4079"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1837675","reference_id":"show_bug.cgi?id=1837675","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1837675"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"},{"reference_url":"https://usn.ubuntu.com/6214-1/","reference_id":"USN-6214-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6214-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/478753?format=json","purl":"pkg:apk/alpine/firefox-esr@115.0-r0?arch=x86_64&distroversion=edge&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.0-r0%3Farch=x86_64&distroversion=edge&reponame=community"}],"aliases":["CVE-2023-37208"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-52ha-qvpu-ruc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61512?format=json","vulnerability_id":"VCID-8r1a-6vz3-r3a9","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37212","reference_id":"","reference_type":"","scores":[{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46814","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46864","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54209","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54184","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54237","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54233","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54265","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54243","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54286","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54229","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54282","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54179","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37212"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/478753?format=json","purl":"pkg:apk/alpine/firefox-esr@115.0-r0?arch=x86_64&distroversion=edge&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.0-r0%3Farch=x86_64&distroversion=edge&reponame=community"}],"aliases":["CVE-2023-37212"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8r1a-6vz3-r3a9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61510?format=json","vulnerability_id":"VCID-avqy-uk9j-2kev","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37209","reference_id":"","reference_type":"","scores":[{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.4603","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46089","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53643","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53611","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53662","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.5366","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53709","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53676","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53713","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53718","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.537","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53692","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53615","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37209"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/478753?format=json","purl":"pkg:apk/alpine/firefox-esr@115.0-r0?arch=x86_64&distroversion=edge&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.0-r0%3Farch=x86_64&distroversion=edge&reponame=community"}],"aliases":["CVE-2023-37209"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-avqy-uk9j-2kev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51441?format=json","vulnerability_id":"VCID-ch3v-nq5w-3fg4","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37202.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37202.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37202","reference_id":"","reference_type":"","scores":[{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69856","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69805","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69866","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.6987","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71153","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71136","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71128","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.7117","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71183","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71206","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71192","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71176","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71221","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71228","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219748","reference_id":"2219748","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219748"},{"reference_url":"https://www.debian.org/security/2023/dsa-5450","reference_id":"dsa-5450","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://www.debian.org/security/2023/dsa-5450"},{"reference_url":"https://www.debian.org/security/2023/dsa-5451","reference_id":"dsa-5451","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://www.debian.org/security/2023/dsa-5451"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-22/","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-22/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-23/","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-23/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-24/","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-24/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4062","reference_id":"RHSA-2023:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4063","reference_id":"RHSA-2023:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4064","reference_id":"RHSA-2023:4064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4065","reference_id":"RHSA-2023:4065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4066","reference_id":"RHSA-2023:4066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4067","reference_id":"RHSA-2023:4067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4068","reference_id":"RHSA-2023:4068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4069","reference_id":"RHSA-2023:4069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4070","reference_id":"RHSA-2023:4070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4071","reference_id":"RHSA-2023:4071","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4071"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4072","reference_id":"RHSA-2023:4072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4073","reference_id":"RHSA-2023:4073","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4073"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4074","reference_id":"RHSA-2023:4074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4075","reference_id":"RHSA-2023:4075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4076","reference_id":"RHSA-2023:4076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4079","reference_id":"RHSA-2023:4079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4079"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1834711","reference_id":"show_bug.cgi?id=1834711","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1834711"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"},{"reference_url":"https://usn.ubuntu.com/6214-1/","reference_id":"USN-6214-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6214-1/"},{"reference_url":"https://usn.ubuntu.com/6227-1/","reference_id":"USN-6227-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6227-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/478753?format=json","purl":"pkg:apk/alpine/firefox-esr@115.0-r0?arch=x86_64&distroversion=edge&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.0-r0%3Farch=x86_64&distroversion=edge&reponame=community"}],"aliases":["CVE-2023-37202"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ch3v-nq5w-3fg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61506?format=json","vulnerability_id":"VCID-e48r-fz4d-77c3","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37203","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13382","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13488","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18292","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18189","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18142","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18093","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18035","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18048","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18082","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1799","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18343","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18045","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18184","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37203"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-22/","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:50Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-22/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=291640","reference_id":"show_bug.cgi?id=291640","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:50Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=291640"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/478753?format=json","purl":"pkg:apk/alpine/firefox-esr@115.0-r0?arch=x86_64&distroversion=edge&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.0-r0%3Farch=x86_64&distroversion=edge&reponame=community"}],"aliases":["CVE-2023-37203"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e48r-fz4d-77c3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51440?format=json","vulnerability_id":"VCID-gs3s-s4zk-fyh4","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37201.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37201.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37201","reference_id":"","reference_type":"","scores":[{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72324","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72279","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72333","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72329","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73217","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73196","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73191","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73241","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73266","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73246","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73239","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73282","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73291","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219747","reference_id":"2219747","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219747"},{"reference_url":"https://www.debian.org/security/2023/dsa-5450","reference_id":"dsa-5450","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://www.debian.org/security/2023/dsa-5450"},{"reference_url":"https://www.debian.org/security/2023/dsa-5451","reference_id":"dsa-5451","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://www.debian.org/security/2023/dsa-5451"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-22/","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-22/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-23/","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-23/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-24/","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-24/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4062","reference_id":"RHSA-2023:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4063","reference_id":"RHSA-2023:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4064","reference_id":"RHSA-2023:4064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4065","reference_id":"RHSA-2023:4065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4066","reference_id":"RHSA-2023:4066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4067","reference_id":"RHSA-2023:4067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4068","reference_id":"RHSA-2023:4068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4069","reference_id":"RHSA-2023:4069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4070","reference_id":"RHSA-2023:4070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4071","reference_id":"RHSA-2023:4071","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4071"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4072","reference_id":"RHSA-2023:4072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4073","reference_id":"RHSA-2023:4073","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4073"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4074","reference_id":"RHSA-2023:4074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4075","reference_id":"RHSA-2023:4075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4076","reference_id":"RHSA-2023:4076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4079","reference_id":"RHSA-2023:4079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4079"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1826002","reference_id":"show_bug.cgi?id=1826002","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1826002"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"},{"reference_url":"https://usn.ubuntu.com/6214-1/","reference_id":"USN-6214-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6214-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/478753?format=json","purl":"pkg:apk/alpine/firefox-esr@115.0-r0?arch=x86_64&distroversion=edge&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.0-r0%3Farch=x86_64&distroversion=edge&reponame=community"}],"aliases":["CVE-2023-37201"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gs3s-s4zk-fyh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61508?format=json","vulnerability_id":"VCID-hgwp-3pm8-xugw","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37205","reference_id":"","reference_type":"","scores":[{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40656","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40738","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48159","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48109","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48162","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48157","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.4818","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48164","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48217","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48212","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48168","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48148","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48153","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48139","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37205"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/478753?format=json","purl":"pkg:apk/alpine/firefox-esr@115.0-r0?arch=x86_64&distroversion=edge&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.0-r0%3Farch=x86_64&distroversion=edge&reponame=community"}],"aliases":["CVE-2023-37205"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hgwp-3pm8-xugw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51442?format=json","vulnerability_id":"VCID-mwj3-wa1g-buay","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37207.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37207.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37207","reference_id":"","reference_type":"","scores":[{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61555","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61568","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61571","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61566","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66039","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66011","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66007","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66056","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66068","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66087","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66074","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66043","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66078","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66093","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219749","reference_id":"2219749","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219749"},{"reference_url":"https://www.debian.org/security/2023/dsa-5450","reference_id":"dsa-5450","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://www.debian.org/security/2023/dsa-5450"},{"reference_url":"https://www.debian.org/security/2023/dsa-5451","reference_id":"dsa-5451","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://www.debian.org/security/2023/dsa-5451"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-22/","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-22/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-23/","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-23/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-24/","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-24/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4062","reference_id":"RHSA-2023:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4063","reference_id":"RHSA-2023:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4064","reference_id":"RHSA-2023:4064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4065","reference_id":"RHSA-2023:4065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4066","reference_id":"RHSA-2023:4066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4067","reference_id":"RHSA-2023:4067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4068","reference_id":"RHSA-2023:4068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4069","reference_id":"RHSA-2023:4069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4070","reference_id":"RHSA-2023:4070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4071","reference_id":"RHSA-2023:4071","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4071"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4072","reference_id":"RHSA-2023:4072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4073","reference_id":"RHSA-2023:4073","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4073"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4074","reference_id":"RHSA-2023:4074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4075","reference_id":"RHSA-2023:4075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4076","reference_id":"RHSA-2023:4076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4079","reference_id":"RHSA-2023:4079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4079"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1816287","reference_id":"show_bug.cgi?id=1816287","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1816287"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"},{"reference_url":"https://usn.ubuntu.com/6214-1/","reference_id":"USN-6214-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6214-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/478753?format=json","purl":"pkg:apk/alpine/firefox-esr@115.0-r0?arch=x86_64&distroversion=edge&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.0-r0%3Farch=x86_64&distroversion=edge&reponame=community"}],"aliases":["CVE-2023-37207"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mwj3-wa1g-buay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61507?format=json","vulnerability_id":"VCID-up33-tw5e-bucs","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37204","reference_id":"","reference_type":"","scores":[{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36501","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36588","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.4337","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43308","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.4336","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43375","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43396","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.4335","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43409","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43398","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43332","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43266","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43365","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43342","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37204"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/478753?format=json","purl":"pkg:apk/alpine/firefox-esr@115.0-r0?arch=x86_64&distroversion=edge&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.0-r0%3Farch=x86_64&distroversion=edge&reponame=community"}],"aliases":["CVE-2023-37204"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-up33-tw5e-bucs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51444?format=json","vulnerability_id":"VCID-vmm4-dq3p-kqhu","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37211.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37211.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37211","reference_id":"","reference_type":"","scores":[{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64532","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64499","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64519","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68267","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68222","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68216","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68282","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68312","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68301","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68261","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68295","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68308","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68241","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37211"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219751","reference_id":"2219751","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219751"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1832306%2C1834862%2C1835886%2C1836550%2C1837450","reference_id":"buglist.cgi?bug_id=1832306%2C1834862%2C1835886%2C1836550%2C1837450","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1832306%2C1834862%2C1835886%2C1836550%2C1837450"},{"reference_url":"https://www.debian.org/security/2023/dsa-5450","reference_id":"dsa-5450","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://www.debian.org/security/2023/dsa-5450"},{"reference_url":"https://www.debian.org/security/2023/dsa-5451","reference_id":"dsa-5451","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://www.debian.org/security/2023/dsa-5451"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-22/","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-22/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-23/","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-23/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-24/","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-24/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4062","reference_id":"RHSA-2023:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4063","reference_id":"RHSA-2023:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4064","reference_id":"RHSA-2023:4064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4065","reference_id":"RHSA-2023:4065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4066","reference_id":"RHSA-2023:4066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4067","reference_id":"RHSA-2023:4067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4068","reference_id":"RHSA-2023:4068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4069","reference_id":"RHSA-2023:4069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4070","reference_id":"RHSA-2023:4070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4071","reference_id":"RHSA-2023:4071","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4071"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4072","reference_id":"RHSA-2023:4072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4073","reference_id":"RHSA-2023:4073","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4073"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4074","reference_id":"RHSA-2023:4074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4075","reference_id":"RHSA-2023:4075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4076","reference_id":"RHSA-2023:4076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4079","reference_id":"RHSA-2023:4079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4079"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"},{"reference_url":"https://usn.ubuntu.com/6214-1/","reference_id":"USN-6214-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6214-1/"},{"reference_url":"https://usn.ubuntu.com/6227-1/","reference_id":"USN-6227-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6227-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/478753?format=json","purl":"pkg:apk/alpine/firefox-esr@115.0-r0?arch=x86_64&distroversion=edge&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.0-r0%3Farch=x86_64&distroversion=edge&reponame=community"}],"aliases":["CVE-2023-37211"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vmm4-dq3p-kqhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61509?format=json","vulnerability_id":"VCID-x21e-e2q4-a3au","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37206","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38713","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38796","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45789","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45739","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45796","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45793","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45815","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.4584","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45833","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.4578","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45709","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45784","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45768","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37206"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/478753?format=json","purl":"pkg:apk/alpine/firefox-esr@115.0-r0?arch=x86_64&distroversion=edge&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.0-r0%3Farch=x86_64&distroversion=edge&reponame=community"}],"aliases":["CVE-2023-37206"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x21e-e2q4-a3au"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61474?format=json","vulnerability_id":"VCID-yxag-tqku-w7fz","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3482","reference_id":"","reference_type":"","scores":[{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40672","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40755","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48195","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48153","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48232","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48227","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48183","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48165","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48174","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48124","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48177","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48172","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48168","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48179","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3482"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-22/","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-12T20:14:31Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-22/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1839464","reference_id":"show_bug.cgi?id=1839464","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-12T20:14:31Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1839464"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/478753?format=json","purl":"pkg:apk/alpine/firefox-esr@115.0-r0?arch=x86_64&distroversion=edge&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.0-r0%3Farch=x86_64&distroversion=edge&reponame=community"}],"aliases":["CVE-2023-3482"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yxag-tqku-w7fz"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@115.0-r0%3Farch=x86_64&distroversion=edge&reponame=community"}