Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/firefox@56.0-1?distro=sid
Typedeb
Namespacedebian
Namefirefox
Version56.0-1
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version57.0-1
Latest_non_vulnerable_version149.0.2-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-cxxg-uk18-pqhq
vulnerability_id VCID-cxxg-uk18-pqhq
summary A vulnerability where WebExtensions can download and attempt to open a file of some non-executable file types. This can be triggered without specific user interaction for the file download and open actions. This could be used to trigger known vulnerabilities in the programs that handle those document types.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7821
reference_id
reference_type
scores
0
value 0.02595
scoring_system epss
scoring_elements 0.85597
published_at 2026-04-13T12:55:00Z
1
value 0.02595
scoring_system epss
scoring_elements 0.85525
published_at 2026-04-01T12:55:00Z
2
value 0.02595
scoring_system epss
scoring_elements 0.85591
published_at 2026-04-09T12:55:00Z
3
value 0.02595
scoring_system epss
scoring_elements 0.85605
published_at 2026-04-11T12:55:00Z
4
value 0.02595
scoring_system epss
scoring_elements 0.85601
published_at 2026-04-12T12:55:00Z
5
value 0.02595
scoring_system epss
scoring_elements 0.85537
published_at 2026-04-02T12:55:00Z
6
value 0.02595
scoring_system epss
scoring_elements 0.85555
published_at 2026-04-04T12:55:00Z
7
value 0.02595
scoring_system epss
scoring_elements 0.8556
published_at 2026-04-07T12:55:00Z
8
value 0.02595
scoring_system epss
scoring_elements 0.8558
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7821
1
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1346515
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1346515
2
reference_url https://www.mozilla.org/security/advisories/mfsa2017-21/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-21/
3
reference_url http://www.securityfocus.com/bid/101057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101057
4
reference_url http://www.securitytracker.com/id/1039465
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039465
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7821
reference_id CVE-2017-7821
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7821
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
reference_id mfsa2017-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
8
reference_url https://usn.ubuntu.com/3435-1/
reference_id USN-3435-1
reference_type
scores
url https://usn.ubuntu.com/3435-1/
fixed_packages
0
url pkg:deb/debian/firefox@56.0-1?distro=sid
purl pkg:deb/debian/firefox@56.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@56.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2017-7821
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cxxg-uk18-pqhq
1
url VCID-dh3c-g3k3-zkb7
vulnerability_id VCID-dh3c-g3k3-zkb7
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7805.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7805.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7805
reference_id
reference_type
scores
0
value 0.03211
scoring_system epss
scoring_elements 0.8703
published_at 2026-04-13T12:55:00Z
1
value 0.03851
scoring_system epss
scoring_elements 0.88141
published_at 2026-04-01T12:55:00Z
2
value 0.03851
scoring_system epss
scoring_elements 0.88207
published_at 2026-04-11T12:55:00Z
3
value 0.03851
scoring_system epss
scoring_elements 0.88197
published_at 2026-04-09T12:55:00Z
4
value 0.03851
scoring_system epss
scoring_elements 0.88191
published_at 2026-04-08T12:55:00Z
5
value 0.03851
scoring_system epss
scoring_elements 0.88149
published_at 2026-04-02T12:55:00Z
6
value 0.03851
scoring_system epss
scoring_elements 0.88199
published_at 2026-04-12T12:55:00Z
7
value 0.03851
scoring_system epss
scoring_elements 0.88166
published_at 2026-04-04T12:55:00Z
8
value 0.03851
scoring_system epss
scoring_elements 0.88171
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7805
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1377618
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1377618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
13
reference_url https://www.debian.org/security/2017/dsa-3987
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3987
14
reference_url https://www.debian.org/security/2017/dsa-3998
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3998
15
reference_url https://www.debian.org/security/2017/dsa-4014
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4014
16
reference_url https://www.mozilla.org/security/advisories/mfsa2017-21/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-21/
17
reference_url https://www.mozilla.org/security/advisories/mfsa2017-22/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-22/
18
reference_url https://www.mozilla.org/security/advisories/mfsa2017-23/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-23/
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
20
reference_url http://www.securityfocus.com/bid/101059
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101059
21
reference_url http://www.securitytracker.com/id/1039465
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039465
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471171
reference_id 1471171
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471171
23
reference_url https://security.archlinux.org/ASA-201710-19
reference_id ASA-201710-19
reference_type
scores
url https://security.archlinux.org/ASA-201710-19
24
reference_url https://security.archlinux.org/AVG-441
reference_id AVG-441
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-441
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:52.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:52.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:52.4.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:56.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:56.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:56.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:52.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:52.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:52.4.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7805
reference_id CVE-2017-7805
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7805
32
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
33
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
34
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
reference_id mfsa2017-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
35
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
reference_id mfsa2017-22
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
36
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
reference_id mfsa2017-23
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
37
reference_url https://access.redhat.com/errata/RHSA-2017:2832
reference_id RHSA-2017:2832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2832
38
reference_url https://usn.ubuntu.com/3431-1/
reference_id USN-3431-1
reference_type
scores
url https://usn.ubuntu.com/3431-1/
39
reference_url https://usn.ubuntu.com/3435-1/
reference_id USN-3435-1
reference_type
scores
url https://usn.ubuntu.com/3435-1/
40
reference_url https://usn.ubuntu.com/3436-1/
reference_id USN-3436-1
reference_type
scores
url https://usn.ubuntu.com/3436-1/
fixed_packages
0
url pkg:deb/debian/firefox@56.0-1?distro=sid
purl pkg:deb/debian/firefox@56.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@56.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2017-7805
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dh3c-g3k3-zkb7
2
url VCID-dydk-9hwf-4ka4
vulnerability_id VCID-dydk-9hwf-4ka4
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7793.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7793.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7793
reference_id
reference_type
scores
0
value 0.02442
scoring_system epss
scoring_elements 0.8518
published_at 2026-04-13T12:55:00Z
1
value 0.02442
scoring_system epss
scoring_elements 0.85183
published_at 2026-04-12T12:55:00Z
2
value 0.02442
scoring_system epss
scoring_elements 0.85108
published_at 2026-04-01T12:55:00Z
3
value 0.02442
scoring_system epss
scoring_elements 0.85185
published_at 2026-04-11T12:55:00Z
4
value 0.02442
scoring_system epss
scoring_elements 0.85171
published_at 2026-04-09T12:55:00Z
5
value 0.02442
scoring_system epss
scoring_elements 0.85163
published_at 2026-04-08T12:55:00Z
6
value 0.02442
scoring_system epss
scoring_elements 0.8512
published_at 2026-04-02T12:55:00Z
7
value 0.02442
scoring_system epss
scoring_elements 0.85137
published_at 2026-04-04T12:55:00Z
8
value 0.02442
scoring_system epss
scoring_elements 0.85141
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7793
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1371889
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1371889
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
13
reference_url https://www.debian.org/security/2017/dsa-3987
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3987
14
reference_url https://www.debian.org/security/2017/dsa-4014
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4014
15
reference_url https://www.mozilla.org/security/advisories/mfsa2017-21/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-21/
16
reference_url https://www.mozilla.org/security/advisories/mfsa2017-22/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-22/
17
reference_url https://www.mozilla.org/security/advisories/mfsa2017-23/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-23/
18
reference_url http://www.securityfocus.com/bid/101055
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101055
19
reference_url http://www.securitytracker.com/id/1039465
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039465
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1496649
reference_id 1496649
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1496649
21
reference_url https://security.archlinux.org/ASA-201710-19
reference_id ASA-201710-19
reference_type
scores
url https://security.archlinux.org/ASA-201710-19
22
reference_url https://security.archlinux.org/AVG-441
reference_id AVG-441
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-441
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7793
reference_id CVE-2017-7793
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7793
46
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
47
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
48
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
reference_id mfsa2017-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
49
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
reference_id mfsa2017-22
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
50
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
reference_id mfsa2017-23
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
51
reference_url https://access.redhat.com/errata/RHSA-2017:2831
reference_id RHSA-2017:2831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2831
52
reference_url https://access.redhat.com/errata/RHSA-2017:2885
reference_id RHSA-2017:2885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2885
53
reference_url https://usn.ubuntu.com/3435-1/
reference_id USN-3435-1
reference_type
scores
url https://usn.ubuntu.com/3435-1/
54
reference_url https://usn.ubuntu.com/3436-1/
reference_id USN-3436-1
reference_type
scores
url https://usn.ubuntu.com/3436-1/
fixed_packages
0
url pkg:deb/debian/firefox@56.0-1?distro=sid
purl pkg:deb/debian/firefox@56.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@56.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2017-7793
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dydk-9hwf-4ka4
3
url VCID-e36h-6n36-puht
vulnerability_id VCID-e36h-6n36-puht
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7814.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7814.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7814
reference_id
reference_type
scores
0
value 0.00319
scoring_system epss
scoring_elements 0.54959
published_at 2026-04-13T12:55:00Z
1
value 0.00319
scoring_system epss
scoring_elements 0.54983
published_at 2026-04-12T12:55:00Z
2
value 0.00319
scoring_system epss
scoring_elements 0.54874
published_at 2026-04-01T12:55:00Z
3
value 0.00319
scoring_system epss
scoring_elements 0.55001
published_at 2026-04-11T12:55:00Z
4
value 0.00319
scoring_system epss
scoring_elements 0.54988
published_at 2026-04-09T12:55:00Z
5
value 0.00319
scoring_system epss
scoring_elements 0.5499
published_at 2026-04-08T12:55:00Z
6
value 0.00319
scoring_system epss
scoring_elements 0.54945
published_at 2026-04-02T12:55:00Z
7
value 0.00319
scoring_system epss
scoring_elements 0.54971
published_at 2026-04-04T12:55:00Z
8
value 0.00319
scoring_system epss
scoring_elements 0.5494
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7814
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1376036
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1376036
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:N
1
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
13
reference_url https://www.debian.org/security/2017/dsa-3987
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3987
14
reference_url https://www.debian.org/security/2017/dsa-4014
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4014
15
reference_url https://www.mozilla.org/security/advisories/mfsa2017-21/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-21/
16
reference_url https://www.mozilla.org/security/advisories/mfsa2017-22/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-22/
17
reference_url https://www.mozilla.org/security/advisories/mfsa2017-23/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-23/
18
reference_url http://www.securityfocus.com/bid/101059
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101059
19
reference_url http://www.securitytracker.com/id/1039465
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039465
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1496652
reference_id 1496652
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1496652
21
reference_url https://security.archlinux.org/ASA-201710-19
reference_id ASA-201710-19
reference_type
scores
url https://security.archlinux.org/ASA-201710-19
22
reference_url https://security.archlinux.org/AVG-441
reference_id AVG-441
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-441
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7814
reference_id CVE-2017-7814
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7814
38
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
39
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
40
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
reference_id mfsa2017-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
41
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
reference_id mfsa2017-22
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
42
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
reference_id mfsa2017-23
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
43
reference_url https://access.redhat.com/errata/RHSA-2017:2831
reference_id RHSA-2017:2831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2831
44
reference_url https://access.redhat.com/errata/RHSA-2017:2885
reference_id RHSA-2017:2885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2885
45
reference_url https://usn.ubuntu.com/3435-1/
reference_id USN-3435-1
reference_type
scores
url https://usn.ubuntu.com/3435-1/
46
reference_url https://usn.ubuntu.com/3436-1/
reference_id USN-3436-1
reference_type
scores
url https://usn.ubuntu.com/3436-1/
fixed_packages
0
url pkg:deb/debian/firefox@56.0-1?distro=sid
purl pkg:deb/debian/firefox@56.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@56.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2017-7814
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e36h-6n36-puht
4
url VCID-kvxt-7wyx-dfbr
vulnerability_id VCID-kvxt-7wyx-dfbr
summary WebExtensions could use popups and panels in the extension UI to load an about: privileged URL, violating security checks that disallow this behavior.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7816
reference_id
reference_type
scores
0
value 0.00272
scoring_system epss
scoring_elements 0.50654
published_at 2026-04-12T12:55:00Z
1
value 0.00272
scoring_system epss
scoring_elements 0.5055
published_at 2026-04-01T12:55:00Z
2
value 0.00272
scoring_system epss
scoring_elements 0.50638
published_at 2026-04-13T12:55:00Z
3
value 0.00272
scoring_system epss
scoring_elements 0.50634
published_at 2026-04-09T12:55:00Z
4
value 0.00272
scoring_system epss
scoring_elements 0.50676
published_at 2026-04-11T12:55:00Z
5
value 0.00272
scoring_system epss
scoring_elements 0.50602
published_at 2026-04-02T12:55:00Z
6
value 0.00272
scoring_system epss
scoring_elements 0.5063
published_at 2026-04-04T12:55:00Z
7
value 0.00272
scoring_system epss
scoring_elements 0.50583
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7816
1
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1380597
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1380597
2
reference_url https://www.mozilla.org/security/advisories/mfsa2017-21/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-21/
3
reference_url http://www.securityfocus.com/bid/101057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101057
4
reference_url http://www.securitytracker.com/id/1039465
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039465
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7816
reference_id CVE-2017-7816
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-7816
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
reference_id mfsa2017-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
8
reference_url https://usn.ubuntu.com/3435-1/
reference_id USN-3435-1
reference_type
scores
url https://usn.ubuntu.com/3435-1/
fixed_packages
0
url pkg:deb/debian/firefox@56.0-1?distro=sid
purl pkg:deb/debian/firefox@56.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@56.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2017-7816
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kvxt-7wyx-dfbr
5
url VCID-m3w6-89ms-z3fk
vulnerability_id VCID-m3w6-89ms-z3fk
summary The AES-GCM implementation in WebCrypto API accepts 0-length IV when it should require a length of 1 according to the NIST Special Publication 800-38D specification. This might allow for the authentication key to be determined in some instances.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7822
reference_id
reference_type
scores
0
value 0.00451
scoring_system epss
scoring_elements 0.63708
published_at 2026-04-12T12:55:00Z
1
value 0.00451
scoring_system epss
scoring_elements 0.63723
published_at 2026-04-11T12:55:00Z
2
value 0.00451
scoring_system epss
scoring_elements 0.63675
published_at 2026-04-13T12:55:00Z
3
value 0.00451
scoring_system epss
scoring_elements 0.63709
published_at 2026-04-09T12:55:00Z
4
value 0.00612
scoring_system epss
scoring_elements 0.698
published_at 2026-04-08T12:55:00Z
5
value 0.00612
scoring_system epss
scoring_elements 0.69752
published_at 2026-04-07T12:55:00Z
6
value 0.00612
scoring_system epss
scoring_elements 0.69748
published_at 2026-04-01T12:55:00Z
7
value 0.00612
scoring_system epss
scoring_elements 0.6976
published_at 2026-04-02T12:55:00Z
8
value 0.00612
scoring_system epss
scoring_elements 0.69776
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7822
1
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1368859
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1368859
2
reference_url https://www.mozilla.org/security/advisories/mfsa2017-21/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-21/
3
reference_url http://www.securityfocus.com/bid/101057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101057
4
reference_url http://www.securitytracker.com/id/1039465
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039465
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7822
reference_id CVE-2017-7822
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-7822
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
reference_id mfsa2017-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
8
reference_url https://usn.ubuntu.com/3435-1/
reference_id USN-3435-1
reference_type
scores
url https://usn.ubuntu.com/3435-1/
fixed_packages
0
url pkg:deb/debian/firefox@56.0-1?distro=sid
purl pkg:deb/debian/firefox@56.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@56.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2017-7822
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m3w6-89ms-z3fk
6
url VCID-nfr9-wq4n-97df
vulnerability_id VCID-nfr9-wq4n-97df
summary If web content on a page is dragged onto portions of the browser UI, such as the tab bar, links can be opened that otherwise would not be allowed to open. This can allow malicious web content to open a locally stored file through file: URLs.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7812
reference_id
reference_type
scores
0
value 0.00272
scoring_system epss
scoring_elements 0.50654
published_at 2026-04-12T12:55:00Z
1
value 0.00272
scoring_system epss
scoring_elements 0.5055
published_at 2026-04-01T12:55:00Z
2
value 0.00272
scoring_system epss
scoring_elements 0.50638
published_at 2026-04-13T12:55:00Z
3
value 0.00272
scoring_system epss
scoring_elements 0.50634
published_at 2026-04-09T12:55:00Z
4
value 0.00272
scoring_system epss
scoring_elements 0.50676
published_at 2026-04-11T12:55:00Z
5
value 0.00272
scoring_system epss
scoring_elements 0.50602
published_at 2026-04-02T12:55:00Z
6
value 0.00272
scoring_system epss
scoring_elements 0.5063
published_at 2026-04-04T12:55:00Z
7
value 0.00272
scoring_system epss
scoring_elements 0.50583
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7812
1
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1379842
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1379842
2
reference_url https://www.mozilla.org/security/advisories/mfsa2017-21/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-21/
3
reference_url http://www.securityfocus.com/bid/101057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101057
4
reference_url http://www.securitytracker.com/id/1039465
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039465
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7812
reference_id CVE-2017-7812
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-7812
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
reference_id mfsa2017-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
8
reference_url https://usn.ubuntu.com/3435-1/
reference_id USN-3435-1
reference_type
scores
url https://usn.ubuntu.com/3435-1/
fixed_packages
0
url pkg:deb/debian/firefox@56.0-1?distro=sid
purl pkg:deb/debian/firefox@56.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@56.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2017-7812
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nfr9-wq4n-97df
7
url VCID-qwvy-9yec-dybk
vulnerability_id VCID-qwvy-9yec-dybk
summary The instanceof operator can bypass the Xray wrapper mechanism. When called on web content from the browser itself or an extension the web content can provide its own result for that operator, possibly tricking the browser or extension into mishandling the element.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7820
reference_id
reference_type
scores
0
value 0.00807
scoring_system epss
scoring_elements 0.74178
published_at 2026-04-13T12:55:00Z
1
value 0.00807
scoring_system epss
scoring_elements 0.7413
published_at 2026-04-01T12:55:00Z
2
value 0.00807
scoring_system epss
scoring_elements 0.74181
published_at 2026-04-09T12:55:00Z
3
value 0.00807
scoring_system epss
scoring_elements 0.74202
published_at 2026-04-11T12:55:00Z
4
value 0.00807
scoring_system epss
scoring_elements 0.74185
published_at 2026-04-12T12:55:00Z
5
value 0.00807
scoring_system epss
scoring_elements 0.74135
published_at 2026-04-02T12:55:00Z
6
value 0.00807
scoring_system epss
scoring_elements 0.74161
published_at 2026-04-04T12:55:00Z
7
value 0.00807
scoring_system epss
scoring_elements 0.74133
published_at 2026-04-07T12:55:00Z
8
value 0.00807
scoring_system epss
scoring_elements 0.74166
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7820
1
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1378207
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1378207
2
reference_url https://www.mozilla.org/security/advisories/mfsa2017-21/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-21/
3
reference_url http://www.securityfocus.com/bid/101057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101057
4
reference_url http://www.securitytracker.com/id/1039465
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039465
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7820
reference_id CVE-2017-7820
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-7820
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
reference_id mfsa2017-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
8
reference_url https://usn.ubuntu.com/3435-1/
reference_id USN-3435-1
reference_type
scores
url https://usn.ubuntu.com/3435-1/
fixed_packages
0
url pkg:deb/debian/firefox@56.0-1?distro=sid
purl pkg:deb/debian/firefox@56.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@56.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2017-7820
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qwvy-9yec-dybk
8
url VCID-u584-a1yu-jqcf
vulnerability_id VCID-u584-a1yu-jqcf
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7824.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7824.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7824
reference_id
reference_type
scores
0
value 0.12063
scoring_system epss
scoring_elements 0.93787
published_at 2026-04-13T12:55:00Z
1
value 0.12063
scoring_system epss
scoring_elements 0.93786
published_at 2026-04-11T12:55:00Z
2
value 0.12063
scoring_system epss
scoring_elements 0.93748
published_at 2026-04-01T12:55:00Z
3
value 0.12063
scoring_system epss
scoring_elements 0.93782
published_at 2026-04-09T12:55:00Z
4
value 0.12063
scoring_system epss
scoring_elements 0.9378
published_at 2026-04-08T12:55:00Z
5
value 0.12063
scoring_system epss
scoring_elements 0.93771
published_at 2026-04-07T12:55:00Z
6
value 0.12063
scoring_system epss
scoring_elements 0.93757
published_at 2026-04-02T12:55:00Z
7
value 0.12063
scoring_system epss
scoring_elements 0.93767
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7824
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1398381
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1398381
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
13
reference_url https://www.debian.org/security/2017/dsa-3987
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3987
14
reference_url https://www.debian.org/security/2017/dsa-4014
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4014
15
reference_url https://www.mozilla.org/security/advisories/mfsa2017-21/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-21/
16
reference_url https://www.mozilla.org/security/advisories/mfsa2017-22/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-22/
17
reference_url https://www.mozilla.org/security/advisories/mfsa2017-23/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-23/
18
reference_url http://www.securityfocus.com/bid/101053
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101053
19
reference_url http://www.securitytracker.com/id/1039465
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039465
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1496656
reference_id 1496656
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1496656
21
reference_url https://security.archlinux.org/ASA-201710-19
reference_id ASA-201710-19
reference_type
scores
url https://security.archlinux.org/ASA-201710-19
22
reference_url https://security.archlinux.org/AVG-441
reference_id AVG-441
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-441
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:7.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7824
reference_id CVE-2017-7824
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7824
38
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
39
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
40
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
reference_id mfsa2017-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
41
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
reference_id mfsa2017-22
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
42
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
reference_id mfsa2017-23
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
43
reference_url https://access.redhat.com/errata/RHSA-2017:2831
reference_id RHSA-2017:2831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2831
44
reference_url https://access.redhat.com/errata/RHSA-2017:2885
reference_id RHSA-2017:2885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2885
45
reference_url https://usn.ubuntu.com/3435-1/
reference_id USN-3435-1
reference_type
scores
url https://usn.ubuntu.com/3435-1/
46
reference_url https://usn.ubuntu.com/3436-1/
reference_id USN-3436-1
reference_type
scores
url https://usn.ubuntu.com/3436-1/
fixed_packages
0
url pkg:deb/debian/firefox@56.0-1?distro=sid
purl pkg:deb/debian/firefox@56.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@56.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2017-7824
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u584-a1yu-jqcf
9
url VCID-u8sk-mm4g-ffem
vulnerability_id VCID-u8sk-mm4g-ffem
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7823.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7823.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7823
reference_id
reference_type
scores
0
value 0.01416
scoring_system epss
scoring_elements 0.80556
published_at 2026-04-13T12:55:00Z
1
value 0.01416
scoring_system epss
scoring_elements 0.80564
published_at 2026-04-12T12:55:00Z
2
value 0.01416
scoring_system epss
scoring_elements 0.80503
published_at 2026-04-01T12:55:00Z
3
value 0.01416
scoring_system epss
scoring_elements 0.80577
published_at 2026-04-11T12:55:00Z
4
value 0.01416
scoring_system epss
scoring_elements 0.8056
published_at 2026-04-09T12:55:00Z
5
value 0.01416
scoring_system epss
scoring_elements 0.8055
published_at 2026-04-08T12:55:00Z
6
value 0.01416
scoring_system epss
scoring_elements 0.80509
published_at 2026-04-02T12:55:00Z
7
value 0.01416
scoring_system epss
scoring_elements 0.80531
published_at 2026-04-04T12:55:00Z
8
value 0.01416
scoring_system epss
scoring_elements 0.80521
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7823
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1396320
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1396320
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:N
1
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
13
reference_url https://www.debian.org/security/2017/dsa-3987
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3987
14
reference_url https://www.debian.org/security/2017/dsa-4014
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4014
15
reference_url https://www.mozilla.org/security/advisories/mfsa2017-21/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-21/
16
reference_url https://www.mozilla.org/security/advisories/mfsa2017-22/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-22/
17
reference_url https://www.mozilla.org/security/advisories/mfsa2017-23/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-23/
18
reference_url http://www.securityfocus.com/bid/101059
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101059
19
reference_url http://www.securitytracker.com/id/1039465
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039465
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1496655
reference_id 1496655
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1496655
21
reference_url https://security.archlinux.org/ASA-201710-19
reference_id ASA-201710-19
reference_type
scores
url https://security.archlinux.org/ASA-201710-19
22
reference_url https://security.archlinux.org/AVG-441
reference_id AVG-441
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-441
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7823
reference_id CVE-2017-7823
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-7823
38
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
39
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
40
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
reference_id mfsa2017-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
41
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
reference_id mfsa2017-22
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
42
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
reference_id mfsa2017-23
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
43
reference_url https://access.redhat.com/errata/RHSA-2017:2831
reference_id RHSA-2017:2831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2831
44
reference_url https://access.redhat.com/errata/RHSA-2017:2885
reference_id RHSA-2017:2885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2885
45
reference_url https://usn.ubuntu.com/3435-1/
reference_id USN-3435-1
reference_type
scores
url https://usn.ubuntu.com/3435-1/
46
reference_url https://usn.ubuntu.com/3436-1/
reference_id USN-3436-1
reference_type
scores
url https://usn.ubuntu.com/3436-1/
fixed_packages
0
url pkg:deb/debian/firefox@56.0-1?distro=sid
purl pkg:deb/debian/firefox@56.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@56.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2017-7823
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u8sk-mm4g-ffem
10
url VCID-wfn6-c2ap-y3g4
vulnerability_id VCID-wfn6-c2ap-y3g4
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7810.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7810.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7810
reference_id
reference_type
scores
0
value 0.02388
scoring_system epss
scoring_elements 0.85012
published_at 2026-04-13T12:55:00Z
1
value 0.02388
scoring_system epss
scoring_elements 0.85015
published_at 2026-04-12T12:55:00Z
2
value 0.02388
scoring_system epss
scoring_elements 0.84936
published_at 2026-04-01T12:55:00Z
3
value 0.02388
scoring_system epss
scoring_elements 0.85017
published_at 2026-04-11T12:55:00Z
4
value 0.02388
scoring_system epss
scoring_elements 0.85001
published_at 2026-04-09T12:55:00Z
5
value 0.02388
scoring_system epss
scoring_elements 0.84994
published_at 2026-04-08T12:55:00Z
6
value 0.02388
scoring_system epss
scoring_elements 0.8495
published_at 2026-04-02T12:55:00Z
7
value 0.02388
scoring_system epss
scoring_elements 0.84967
published_at 2026-04-04T12:55:00Z
8
value 0.02388
scoring_system epss
scoring_elements 0.84971
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7810
2
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1386787%2C1389974%2C1371657%2C1360334%2C1390550%2C1380824%2C1387918%2C1395598
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1386787%2C1389974%2C1371657%2C1360334%2C1390550%2C1380824%2C1387918%2C1395598
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
13
reference_url https://www.debian.org/security/2017/dsa-3987
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3987
14
reference_url https://www.debian.org/security/2017/dsa-4014
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4014
15
reference_url https://www.mozilla.org/security/advisories/mfsa2017-21/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-21/
16
reference_url https://www.mozilla.org/security/advisories/mfsa2017-22/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-22/
17
reference_url https://www.mozilla.org/security/advisories/mfsa2017-23/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-23/
18
reference_url http://www.securityfocus.com/bid/101054
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101054
19
reference_url http://www.securitytracker.com/id/1039465
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039465
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1496651
reference_id 1496651
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1496651
21
reference_url https://security.archlinux.org/ASA-201710-19
reference_id ASA-201710-19
reference_type
scores
url https://security.archlinux.org/ASA-201710-19
22
reference_url https://security.archlinux.org/AVG-441
reference_id AVG-441
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-441
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7810
reference_id CVE-2017-7810
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7810
40
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
41
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
42
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
reference_id mfsa2017-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
43
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
reference_id mfsa2017-22
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
44
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
reference_id mfsa2017-23
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
45
reference_url https://access.redhat.com/errata/RHSA-2017:2831
reference_id RHSA-2017:2831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2831
46
reference_url https://access.redhat.com/errata/RHSA-2017:2885
reference_id RHSA-2017:2885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2885
47
reference_url https://usn.ubuntu.com/3435-1/
reference_id USN-3435-1
reference_type
scores
url https://usn.ubuntu.com/3435-1/
48
reference_url https://usn.ubuntu.com/3436-1/
reference_id USN-3436-1
reference_type
scores
url https://usn.ubuntu.com/3436-1/
49
reference_url https://usn.ubuntu.com/3688-1/
reference_id USN-3688-1
reference_type
scores
url https://usn.ubuntu.com/3688-1/
fixed_packages
0
url pkg:deb/debian/firefox@56.0-1?distro=sid
purl pkg:deb/debian/firefox@56.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@56.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2017-7810
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wfn6-c2ap-y3g4
11
url VCID-yaz5-6485-u7c1
vulnerability_id VCID-yaz5-6485-u7c1
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7818.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7818.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7818
reference_id
reference_type
scores
0
value 0.06919
scoring_system epss
scoring_elements 0.91407
published_at 2026-04-13T12:55:00Z
1
value 0.06919
scoring_system epss
scoring_elements 0.91408
published_at 2026-04-12T12:55:00Z
2
value 0.06919
scoring_system epss
scoring_elements 0.91356
published_at 2026-04-01T12:55:00Z
3
value 0.06919
scoring_system epss
scoring_elements 0.91405
published_at 2026-04-11T12:55:00Z
4
value 0.06919
scoring_system epss
scoring_elements 0.91399
published_at 2026-04-09T12:55:00Z
5
value 0.06919
scoring_system epss
scoring_elements 0.91392
published_at 2026-04-08T12:55:00Z
6
value 0.06919
scoring_system epss
scoring_elements 0.91362
published_at 2026-04-02T12:55:00Z
7
value 0.06919
scoring_system epss
scoring_elements 0.91372
published_at 2026-04-04T12:55:00Z
8
value 0.06919
scoring_system epss
scoring_elements 0.91379
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7818
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1363723
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1363723
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
13
reference_url https://www.debian.org/security/2017/dsa-3987
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3987
14
reference_url https://www.debian.org/security/2017/dsa-4014
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4014
15
reference_url https://www.mozilla.org/security/advisories/mfsa2017-21/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-21/
16
reference_url https://www.mozilla.org/security/advisories/mfsa2017-22/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-22/
17
reference_url https://www.mozilla.org/security/advisories/mfsa2017-23/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-23/
18
reference_url http://www.securityfocus.com/bid/101055
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101055
19
reference_url http://www.securitytracker.com/id/1039465
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039465
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1496653
reference_id 1496653
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1496653
21
reference_url https://security.archlinux.org/ASA-201710-19
reference_id ASA-201710-19
reference_type
scores
url https://security.archlinux.org/ASA-201710-19
22
reference_url https://security.archlinux.org/AVG-441
reference_id AVG-441
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-441
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7818
reference_id CVE-2017-7818
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7818
39
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
40
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
41
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
reference_id mfsa2017-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
42
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
reference_id mfsa2017-22
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
43
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
reference_id mfsa2017-23
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
44
reference_url https://access.redhat.com/errata/RHSA-2017:2831
reference_id RHSA-2017:2831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2831
45
reference_url https://access.redhat.com/errata/RHSA-2017:2885
reference_id RHSA-2017:2885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2885
46
reference_url https://usn.ubuntu.com/3435-1/
reference_id USN-3435-1
reference_type
scores
url https://usn.ubuntu.com/3435-1/
47
reference_url https://usn.ubuntu.com/3436-1/
reference_id USN-3436-1
reference_type
scores
url https://usn.ubuntu.com/3436-1/
fixed_packages
0
url pkg:deb/debian/firefox@56.0-1?distro=sid
purl pkg:deb/debian/firefox@56.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@56.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2017-7818
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yaz5-6485-u7c1
12
url VCID-ykzd-mar6-r3c5
vulnerability_id VCID-ykzd-mar6-r3c5
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7819.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7819.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7819
reference_id
reference_type
scores
0
value 0.06919
scoring_system epss
scoring_elements 0.91407
published_at 2026-04-13T12:55:00Z
1
value 0.06919
scoring_system epss
scoring_elements 0.91408
published_at 2026-04-12T12:55:00Z
2
value 0.06919
scoring_system epss
scoring_elements 0.91356
published_at 2026-04-01T12:55:00Z
3
value 0.06919
scoring_system epss
scoring_elements 0.91405
published_at 2026-04-11T12:55:00Z
4
value 0.06919
scoring_system epss
scoring_elements 0.91399
published_at 2026-04-09T12:55:00Z
5
value 0.06919
scoring_system epss
scoring_elements 0.91392
published_at 2026-04-08T12:55:00Z
6
value 0.06919
scoring_system epss
scoring_elements 0.91362
published_at 2026-04-02T12:55:00Z
7
value 0.06919
scoring_system epss
scoring_elements 0.91372
published_at 2026-04-04T12:55:00Z
8
value 0.06919
scoring_system epss
scoring_elements 0.91379
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7819
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1380292
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1380292
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
13
reference_url https://www.debian.org/security/2017/dsa-3987
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3987
14
reference_url https://www.debian.org/security/2017/dsa-4014
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4014
15
reference_url https://www.mozilla.org/security/advisories/mfsa2017-21/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-21/
16
reference_url https://www.mozilla.org/security/advisories/mfsa2017-22/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-22/
17
reference_url https://www.mozilla.org/security/advisories/mfsa2017-23/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-23/
18
reference_url http://www.securityfocus.com/bid/101055
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101055
19
reference_url http://www.securitytracker.com/id/1039465
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039465
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1496654
reference_id 1496654
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1496654
21
reference_url https://security.archlinux.org/ASA-201710-19
reference_id ASA-201710-19
reference_type
scores
url https://security.archlinux.org/ASA-201710-19
22
reference_url https://security.archlinux.org/AVG-441
reference_id AVG-441
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-441
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7819
reference_id CVE-2017-7819
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7819
37
reference_url https://security.gentoo.org/glsa/201802-03
reference_id GLSA-201802-03
reference_type
scores
url https://security.gentoo.org/glsa/201802-03
38
reference_url https://security.gentoo.org/glsa/201803-14
reference_id GLSA-201803-14
reference_type
scores
url https://security.gentoo.org/glsa/201803-14
39
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
reference_id mfsa2017-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
40
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
reference_id mfsa2017-22
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-22
41
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
reference_id mfsa2017-23
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-23
42
reference_url https://access.redhat.com/errata/RHSA-2017:2831
reference_id RHSA-2017:2831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2831
43
reference_url https://access.redhat.com/errata/RHSA-2017:2885
reference_id RHSA-2017:2885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2885
44
reference_url https://usn.ubuntu.com/3435-1/
reference_id USN-3435-1
reference_type
scores
url https://usn.ubuntu.com/3435-1/
45
reference_url https://usn.ubuntu.com/3436-1/
reference_id USN-3436-1
reference_type
scores
url https://usn.ubuntu.com/3436-1/
fixed_packages
0
url pkg:deb/debian/firefox@56.0-1?distro=sid
purl pkg:deb/debian/firefox@56.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@56.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2017-7819
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ykzd-mar6-r3c5
13
url VCID-yzz5-as7s-nkaf
vulnerability_id VCID-yzz5-as7s-nkaf
summary On pages containing an iframe, the data: protocol can be used to create a modal dialog through Javascript that will have an arbitrary domains as the dialog's location, spoofing of the origin of the modal dialog from the user view. *Note: This attack only affects installations with e10 multiprocess turned off. Installations with e10s turned on do not support the modal dialog functionality.*
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7815
reference_id
reference_type
scores
0
value 0.00807
scoring_system epss
scoring_elements 0.74178
published_at 2026-04-13T12:55:00Z
1
value 0.00807
scoring_system epss
scoring_elements 0.7413
published_at 2026-04-01T12:55:00Z
2
value 0.00807
scoring_system epss
scoring_elements 0.74181
published_at 2026-04-09T12:55:00Z
3
value 0.00807
scoring_system epss
scoring_elements 0.74202
published_at 2026-04-11T12:55:00Z
4
value 0.00807
scoring_system epss
scoring_elements 0.74185
published_at 2026-04-12T12:55:00Z
5
value 0.00807
scoring_system epss
scoring_elements 0.74135
published_at 2026-04-02T12:55:00Z
6
value 0.00807
scoring_system epss
scoring_elements 0.74161
published_at 2026-04-04T12:55:00Z
7
value 0.00807
scoring_system epss
scoring_elements 0.74133
published_at 2026-04-07T12:55:00Z
8
value 0.00807
scoring_system epss
scoring_elements 0.74166
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7815
1
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1368981
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1368981
2
reference_url https://www.mozilla.org/security/advisories/mfsa2017-21/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-21/
3
reference_url http://www.securityfocus.com/bid/101057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101057
4
reference_url http://www.securitytracker.com/id/1039465
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039465
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7815
reference_id CVE-2017-7815
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-7815
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
reference_id mfsa2017-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
8
reference_url https://usn.ubuntu.com/3435-1/
reference_id USN-3435-1
reference_type
scores
url https://usn.ubuntu.com/3435-1/
fixed_packages
0
url pkg:deb/debian/firefox@56.0-1?distro=sid
purl pkg:deb/debian/firefox@56.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@56.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2017-7815
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yzz5-as7s-nkaf
14
url VCID-z5mk-4spk-1yc1
vulnerability_id VCID-z5mk-4spk-1yc1
summary Inside the JavaScript parser, a cast of an integer to a narrower type can result in data read from outside the buffer being parsed. This usually results in a non-exploitable crash, but can leak a limited amount of information from memory if it matches JavaScript identifier syntax.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7813
reference_id
reference_type
scores
0
value 0.00579
scoring_system epss
scoring_elements 0.68859
published_at 2026-04-13T12:55:00Z
1
value 0.00579
scoring_system epss
scoring_elements 0.68792
published_at 2026-04-01T12:55:00Z
2
value 0.00579
scoring_system epss
scoring_elements 0.68881
published_at 2026-04-09T12:55:00Z
3
value 0.00579
scoring_system epss
scoring_elements 0.68903
published_at 2026-04-11T12:55:00Z
4
value 0.00579
scoring_system epss
scoring_elements 0.68888
published_at 2026-04-12T12:55:00Z
5
value 0.00579
scoring_system epss
scoring_elements 0.68811
published_at 2026-04-07T12:55:00Z
6
value 0.00579
scoring_system epss
scoring_elements 0.68831
published_at 2026-04-04T12:55:00Z
7
value 0.00579
scoring_system epss
scoring_elements 0.68862
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7813
1
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1383951
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1383951
2
reference_url https://www.mozilla.org/security/advisories/mfsa2017-21/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-21/
3
reference_url http://www.securityfocus.com/bid/101057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101057
4
reference_url http://www.securitytracker.com/id/1039465
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039465
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7813
reference_id CVE-2017-7813
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7813
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
reference_id mfsa2017-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
8
reference_url https://usn.ubuntu.com/3435-1/
reference_id USN-3435-1
reference_type
scores
url https://usn.ubuntu.com/3435-1/
fixed_packages
0
url pkg:deb/debian/firefox@56.0-1?distro=sid
purl pkg:deb/debian/firefox@56.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@56.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2017-7813
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z5mk-4spk-1yc1
15
url VCID-zhen-yj1c-u3d6
vulnerability_id VCID-zhen-yj1c-u3d6
summary Mozilla developers and community members Christian Holler, Jason Kratzer, Tobias Schneider, Tyson Smith, David Keeler, Nicolas B. Pierron, Mike Hommey, Ronald Crane, Tooru Fujisawa, and Philipp reported memory safety bugs present in Firefox 55. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7811
reference_id
reference_type
scores
0
value 0.02107
scoring_system epss
scoring_elements 0.841
published_at 2026-04-13T12:55:00Z
1
value 0.02107
scoring_system epss
scoring_elements 0.8403
published_at 2026-04-01T12:55:00Z
2
value 0.02107
scoring_system epss
scoring_elements 0.84092
published_at 2026-04-09T12:55:00Z
3
value 0.02107
scoring_system epss
scoring_elements 0.8411
published_at 2026-04-11T12:55:00Z
4
value 0.02107
scoring_system epss
scoring_elements 0.84104
published_at 2026-04-12T12:55:00Z
5
value 0.02107
scoring_system epss
scoring_elements 0.84044
published_at 2026-04-02T12:55:00Z
6
value 0.02107
scoring_system epss
scoring_elements 0.84061
published_at 2026-04-04T12:55:00Z
7
value 0.02107
scoring_system epss
scoring_elements 0.84062
published_at 2026-04-07T12:55:00Z
8
value 0.02107
scoring_system epss
scoring_elements 0.84086
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7811
1
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1392105%2C1395919%2C1388113%2C1348955%2C1394522%2C1387659%2C1369560%2C1388045%2C1378658%2C1379414%2C1385112%2C1367497
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1392105%2C1395919%2C1388113%2C1348955%2C1394522%2C1387659%2C1369560%2C1388045%2C1378658%2C1379414%2C1385112%2C1367497
2
reference_url https://www.mozilla.org/security/advisories/mfsa2017-21/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-21/
3
reference_url http://www.securityfocus.com/bid/101057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101057
4
reference_url http://www.securitytracker.com/id/1039465
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039465
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7811
reference_id CVE-2017-7811
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7811
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
reference_id mfsa2017-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-21
8
reference_url https://usn.ubuntu.com/3435-1/
reference_id USN-3435-1
reference_type
scores
url https://usn.ubuntu.com/3435-1/
fixed_packages
0
url pkg:deb/debian/firefox@56.0-1?distro=sid
purl pkg:deb/debian/firefox@56.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@56.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
aliases CVE-2017-7811
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zhen-yj1c-u3d6
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@56.0-1%3Fdistro=sid