Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/firefox@116.0-1?distro=sid
Typedeb
Namespacedebian
Namefirefox
Version116.0-1
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version117.0-1
Latest_non_vulnerable_version150.0.1-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-32pc-j3he-pffx
vulnerability_id VCID-32pc-j3he-pffx
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4055.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4055.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4055
reference_id
reference_type
scores
0
value 0.00348
scoring_system epss
scoring_elements 0.57326
published_at 2026-05-07T12:55:00Z
1
value 0.00348
scoring_system epss
scoring_elements 0.57282
published_at 2026-05-05T12:55:00Z
2
value 0.00348
scoring_system epss
scoring_elements 0.57334
published_at 2026-04-29T12:55:00Z
3
value 0.00348
scoring_system epss
scoring_elements 0.57354
published_at 2026-04-26T12:55:00Z
4
value 0.00348
scoring_system epss
scoring_elements 0.57348
published_at 2026-04-02T12:55:00Z
5
value 0.00348
scoring_system epss
scoring_elements 0.57347
published_at 2026-04-07T12:55:00Z
6
value 0.00348
scoring_system epss
scoring_elements 0.57371
published_at 2026-04-04T12:55:00Z
7
value 0.00348
scoring_system epss
scoring_elements 0.57399
published_at 2026-04-08T12:55:00Z
8
value 0.00348
scoring_system epss
scoring_elements 0.57331
published_at 2026-04-24T12:55:00Z
9
value 0.00348
scoring_system epss
scoring_elements 0.57397
published_at 2026-04-18T12:55:00Z
10
value 0.00348
scoring_system epss
scoring_elements 0.57375
published_at 2026-04-21T12:55:00Z
11
value 0.00348
scoring_system epss
scoring_elements 0.57395
published_at 2026-04-12T12:55:00Z
12
value 0.00348
scoring_system epss
scoring_elements 0.57416
published_at 2026-04-11T12:55:00Z
13
value 0.00348
scoring_system epss
scoring_elements 0.57401
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4055
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228367
reference_id 2228367
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2228367
11
reference_url https://www.debian.org/security/2023/dsa-5464
reference_id dsa-5464
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/
url https://www.debian.org/security/2023/dsa-5464
12
reference_url https://www.debian.org/security/2023/dsa-5469
reference_id dsa-5469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/
url https://www.debian.org/security/2023/dsa-5469
13
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
15
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
reference_id mfsa2023-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
17
reference_url https://www.mozilla.org/security/advisories/mfsa2023-30/
reference_id mfsa2023-30
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/
url https://www.mozilla.org/security/advisories/mfsa2023-30/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
reference_id mfsa2023-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
19
reference_url https://www.mozilla.org/security/advisories/mfsa2023-31/
reference_id mfsa2023-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/
url https://www.mozilla.org/security/advisories/mfsa2023-31/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
reference_id mfsa2023-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
reference_id mfsa2023-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
22
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
23
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
24
reference_url https://access.redhat.com/errata/RHSA-2023:4460
reference_id RHSA-2023:4460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4460
25
reference_url https://access.redhat.com/errata/RHSA-2023:4461
reference_id RHSA-2023:4461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4461
26
reference_url https://access.redhat.com/errata/RHSA-2023:4462
reference_id RHSA-2023:4462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4462
27
reference_url https://access.redhat.com/errata/RHSA-2023:4463
reference_id RHSA-2023:4463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4463
28
reference_url https://access.redhat.com/errata/RHSA-2023:4464
reference_id RHSA-2023:4464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4464
29
reference_url https://access.redhat.com/errata/RHSA-2023:4465
reference_id RHSA-2023:4465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4465
30
reference_url https://access.redhat.com/errata/RHSA-2023:4468
reference_id RHSA-2023:4468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4468
31
reference_url https://access.redhat.com/errata/RHSA-2023:4469
reference_id RHSA-2023:4469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4469
32
reference_url https://access.redhat.com/errata/RHSA-2023:4492
reference_id RHSA-2023:4492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4492
33
reference_url https://access.redhat.com/errata/RHSA-2023:4493
reference_id RHSA-2023:4493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4493
34
reference_url https://access.redhat.com/errata/RHSA-2023:4494
reference_id RHSA-2023:4494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4494
35
reference_url https://access.redhat.com/errata/RHSA-2023:4495
reference_id RHSA-2023:4495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4495
36
reference_url https://access.redhat.com/errata/RHSA-2023:4496
reference_id RHSA-2023:4496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4496
37
reference_url https://access.redhat.com/errata/RHSA-2023:4497
reference_id RHSA-2023:4497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4497
38
reference_url https://access.redhat.com/errata/RHSA-2023:4499
reference_id RHSA-2023:4499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4499
39
reference_url https://access.redhat.com/errata/RHSA-2023:4500
reference_id RHSA-2023:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4500
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1782561
reference_id show_bug.cgi?id=1782561
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1782561
41
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
42
reference_url https://usn.ubuntu.com/6333-1/
reference_id USN-6333-1
reference_type
scores
url https://usn.ubuntu.com/6333-1/
fixed_packages
0
url pkg:deb/debian/firefox@116.0-1?distro=sid
purl pkg:deb/debian/firefox@116.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@116.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
aliases CVE-2023-4055
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-32pc-j3he-pffx
1
url VCID-6tm9-1vsh-1qa3
vulnerability_id VCID-6tm9-1vsh-1qa3
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4047.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4047.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4047
reference_id
reference_type
scores
0
value 0.00519
scoring_system epss
scoring_elements 0.66816
published_at 2026-04-08T12:55:00Z
1
value 0.00519
scoring_system epss
scoring_elements 0.66769
published_at 2026-04-02T12:55:00Z
2
value 0.00519
scoring_system epss
scoring_elements 0.66804
published_at 2026-04-13T12:55:00Z
3
value 0.00519
scoring_system epss
scoring_elements 0.66837
published_at 2026-04-16T12:55:00Z
4
value 0.00519
scoring_system epss
scoring_elements 0.66851
published_at 2026-04-18T12:55:00Z
5
value 0.00519
scoring_system epss
scoring_elements 0.6683
published_at 2026-04-09T12:55:00Z
6
value 0.00519
scoring_system epss
scoring_elements 0.66795
published_at 2026-04-04T12:55:00Z
7
value 0.00519
scoring_system epss
scoring_elements 0.66767
published_at 2026-04-07T12:55:00Z
8
value 0.00582
scoring_system epss
scoring_elements 0.69017
published_at 2026-04-24T12:55:00Z
9
value 0.00582
scoring_system epss
scoring_elements 0.69012
published_at 2026-05-05T12:55:00Z
10
value 0.00582
scoring_system epss
scoring_elements 0.69031
published_at 2026-04-29T12:55:00Z
11
value 0.00582
scoring_system epss
scoring_elements 0.69024
published_at 2026-04-26T12:55:00Z
12
value 0.00582
scoring_system epss
scoring_elements 0.69055
published_at 2026-05-07T12:55:00Z
13
value 0.00582
scoring_system epss
scoring_elements 0.68966
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4047
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228362
reference_id 2228362
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2228362
11
reference_url https://www.debian.org/security/2023/dsa-5464
reference_id dsa-5464
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/
url https://www.debian.org/security/2023/dsa-5464
12
reference_url https://www.debian.org/security/2023/dsa-5469
reference_id dsa-5469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/
url https://www.debian.org/security/2023/dsa-5469
13
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
15
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
reference_id mfsa2023-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
17
reference_url https://www.mozilla.org/security/advisories/mfsa2023-30/
reference_id mfsa2023-30
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/
url https://www.mozilla.org/security/advisories/mfsa2023-30/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
reference_id mfsa2023-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
19
reference_url https://www.mozilla.org/security/advisories/mfsa2023-31/
reference_id mfsa2023-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/
url https://www.mozilla.org/security/advisories/mfsa2023-31/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
reference_id mfsa2023-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
reference_id mfsa2023-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
22
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
23
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
24
reference_url https://access.redhat.com/errata/RHSA-2023:4460
reference_id RHSA-2023:4460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4460
25
reference_url https://access.redhat.com/errata/RHSA-2023:4461
reference_id RHSA-2023:4461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4461
26
reference_url https://access.redhat.com/errata/RHSA-2023:4462
reference_id RHSA-2023:4462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4462
27
reference_url https://access.redhat.com/errata/RHSA-2023:4463
reference_id RHSA-2023:4463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4463
28
reference_url https://access.redhat.com/errata/RHSA-2023:4464
reference_id RHSA-2023:4464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4464
29
reference_url https://access.redhat.com/errata/RHSA-2023:4465
reference_id RHSA-2023:4465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4465
30
reference_url https://access.redhat.com/errata/RHSA-2023:4468
reference_id RHSA-2023:4468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4468
31
reference_url https://access.redhat.com/errata/RHSA-2023:4469
reference_id RHSA-2023:4469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4469
32
reference_url https://access.redhat.com/errata/RHSA-2023:4492
reference_id RHSA-2023:4492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4492
33
reference_url https://access.redhat.com/errata/RHSA-2023:4493
reference_id RHSA-2023:4493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4493
34
reference_url https://access.redhat.com/errata/RHSA-2023:4494
reference_id RHSA-2023:4494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4494
35
reference_url https://access.redhat.com/errata/RHSA-2023:4495
reference_id RHSA-2023:4495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4495
36
reference_url https://access.redhat.com/errata/RHSA-2023:4496
reference_id RHSA-2023:4496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4496
37
reference_url https://access.redhat.com/errata/RHSA-2023:4497
reference_id RHSA-2023:4497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4497
38
reference_url https://access.redhat.com/errata/RHSA-2023:4499
reference_id RHSA-2023:4499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4499
39
reference_url https://access.redhat.com/errata/RHSA-2023:4500
reference_id RHSA-2023:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4500
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1839073
reference_id show_bug.cgi?id=1839073
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1839073
41
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
42
reference_url https://usn.ubuntu.com/6333-1/
reference_id USN-6333-1
reference_type
scores
url https://usn.ubuntu.com/6333-1/
fixed_packages
0
url pkg:deb/debian/firefox@116.0-1?distro=sid
purl pkg:deb/debian/firefox@116.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@116.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
aliases CVE-2023-4047
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6tm9-1vsh-1qa3
2
url VCID-7hye-1c3x-cubf
vulnerability_id VCID-7hye-1c3x-cubf
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4058
reference_id
reference_type
scores
0
value 0.00293
scoring_system epss
scoring_elements 0.52625
published_at 2026-05-07T12:55:00Z
1
value 0.00293
scoring_system epss
scoring_elements 0.52669
published_at 2026-04-26T12:55:00Z
2
value 0.00293
scoring_system epss
scoring_elements 0.52629
published_at 2026-04-29T12:55:00Z
3
value 0.00293
scoring_system epss
scoring_elements 0.52573
published_at 2026-05-05T12:55:00Z
4
value 0.00307
scoring_system epss
scoring_elements 0.53875
published_at 2026-04-08T12:55:00Z
5
value 0.00307
scoring_system epss
scoring_elements 0.53873
published_at 2026-04-09T12:55:00Z
6
value 0.00307
scoring_system epss
scoring_elements 0.53921
published_at 2026-04-11T12:55:00Z
7
value 0.00307
scoring_system epss
scoring_elements 0.53903
published_at 2026-04-12T12:55:00Z
8
value 0.00307
scoring_system epss
scoring_elements 0.53925
published_at 2026-04-16T12:55:00Z
9
value 0.00307
scoring_system epss
scoring_elements 0.53931
published_at 2026-04-18T12:55:00Z
10
value 0.00307
scoring_system epss
scoring_elements 0.53912
published_at 2026-04-21T12:55:00Z
11
value 0.00307
scoring_system epss
scoring_elements 0.53879
published_at 2026-04-24T12:55:00Z
12
value 0.00307
scoring_system epss
scoring_elements 0.53887
published_at 2026-04-13T12:55:00Z
13
value 0.00307
scoring_system epss
scoring_elements 0.53822
published_at 2026-04-02T12:55:00Z
14
value 0.00307
scoring_system epss
scoring_elements 0.53849
published_at 2026-04-04T12:55:00Z
15
value 0.00307
scoring_system epss
scoring_elements 0.53823
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4058
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
2
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
fixed_packages
0
url pkg:deb/debian/firefox@116.0-1?distro=sid
purl pkg:deb/debian/firefox@116.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@116.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
aliases CVE-2023-4058
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7hye-1c3x-cubf
3
url VCID-7sbd-1n7f-ryed
vulnerability_id VCID-7sbd-1n7f-ryed
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4057.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4057.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4057
reference_id
reference_type
scores
0
value 0.00215
scoring_system epss
scoring_elements 0.44044
published_at 2026-04-21T12:55:00Z
1
value 0.00215
scoring_system epss
scoring_elements 0.43791
published_at 2026-05-05T12:55:00Z
2
value 0.00215
scoring_system epss
scoring_elements 0.43995
published_at 2026-04-24T12:55:00Z
3
value 0.00215
scoring_system epss
scoring_elements 0.43865
published_at 2026-05-07T12:55:00Z
4
value 0.00215
scoring_system epss
scoring_elements 0.43914
published_at 2026-04-29T12:55:00Z
5
value 0.00215
scoring_system epss
scoring_elements 0.43999
published_at 2026-04-26T12:55:00Z
6
value 0.0022
scoring_system epss
scoring_elements 0.44619
published_at 2026-04-08T12:55:00Z
7
value 0.0022
scoring_system epss
scoring_elements 0.44609
published_at 2026-04-02T12:55:00Z
8
value 0.0022
scoring_system epss
scoring_elements 0.4463
published_at 2026-04-04T12:55:00Z
9
value 0.0022
scoring_system epss
scoring_elements 0.44567
published_at 2026-04-07T12:55:00Z
10
value 0.0022
scoring_system epss
scoring_elements 0.44622
published_at 2026-04-09T12:55:00Z
11
value 0.0022
scoring_system epss
scoring_elements 0.44639
published_at 2026-04-11T12:55:00Z
12
value 0.0022
scoring_system epss
scoring_elements 0.4461
published_at 2026-04-13T12:55:00Z
13
value 0.0022
scoring_system epss
scoring_elements 0.44665
published_at 2026-04-16T12:55:00Z
14
value 0.0022
scoring_system epss
scoring_elements 0.44658
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4057
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228371
reference_id 2228371
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2228371
3
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
5
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
reference_id mfsa2023-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
7
reference_url https://www.mozilla.org/security/advisories/mfsa2023-31/
reference_id mfsa2023-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/
url https://www.mozilla.org/security/advisories/mfsa2023-31/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
reference_id mfsa2023-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
9
reference_url https://www.mozilla.org/security/advisories/mfsa2023-33/
reference_id mfsa2023-33
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/
url https://www.mozilla.org/security/advisories/mfsa2023-33/
10
reference_url https://access.redhat.com/errata/RHSA-2023:4460
reference_id RHSA-2023:4460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4460
11
reference_url https://access.redhat.com/errata/RHSA-2023:4461
reference_id RHSA-2023:4461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4461
12
reference_url https://access.redhat.com/errata/RHSA-2023:4462
reference_id RHSA-2023:4462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4462
13
reference_url https://access.redhat.com/errata/RHSA-2023:4463
reference_id RHSA-2023:4463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4463
14
reference_url https://access.redhat.com/errata/RHSA-2023:4464
reference_id RHSA-2023:4464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4464
15
reference_url https://access.redhat.com/errata/RHSA-2023:4465
reference_id RHSA-2023:4465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4465
16
reference_url https://access.redhat.com/errata/RHSA-2023:4468
reference_id RHSA-2023:4468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4468
17
reference_url https://access.redhat.com/errata/RHSA-2023:4469
reference_id RHSA-2023:4469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4469
18
reference_url https://access.redhat.com/errata/RHSA-2023:4492
reference_id RHSA-2023:4492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4492
19
reference_url https://access.redhat.com/errata/RHSA-2023:4493
reference_id RHSA-2023:4493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4493
20
reference_url https://access.redhat.com/errata/RHSA-2023:4494
reference_id RHSA-2023:4494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4494
21
reference_url https://access.redhat.com/errata/RHSA-2023:4495
reference_id RHSA-2023:4495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4495
22
reference_url https://access.redhat.com/errata/RHSA-2023:4496
reference_id RHSA-2023:4496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4496
23
reference_url https://access.redhat.com/errata/RHSA-2023:4497
reference_id RHSA-2023:4497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4497
24
reference_url https://access.redhat.com/errata/RHSA-2023:4499
reference_id RHSA-2023:4499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4499
25
reference_url https://access.redhat.com/errata/RHSA-2023:4500
reference_id RHSA-2023:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4500
26
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1841682
reference_id show_bug.cgi?id=1841682
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1841682
27
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
28
reference_url https://usn.ubuntu.com/6405-1/
reference_id USN-6405-1
reference_type
scores
url https://usn.ubuntu.com/6405-1/
fixed_packages
0
url pkg:deb/debian/firefox@116.0-1?distro=sid
purl pkg:deb/debian/firefox@116.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@116.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
aliases CVE-2023-4057
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7sbd-1n7f-ryed
4
url VCID-878b-mn4w-wkg4
vulnerability_id VCID-878b-mn4w-wkg4
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4049.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4049.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4049
reference_id
reference_type
scores
0
value 0.00214
scoring_system epss
scoring_elements 0.43947
published_at 2026-04-21T12:55:00Z
1
value 0.00214
scoring_system epss
scoring_elements 0.43698
published_at 2026-05-05T12:55:00Z
2
value 0.00214
scoring_system epss
scoring_elements 0.43899
published_at 2026-04-24T12:55:00Z
3
value 0.00214
scoring_system epss
scoring_elements 0.43903
published_at 2026-04-26T12:55:00Z
4
value 0.00214
scoring_system epss
scoring_elements 0.43774
published_at 2026-05-07T12:55:00Z
5
value 0.00214
scoring_system epss
scoring_elements 0.43819
published_at 2026-04-29T12:55:00Z
6
value 0.00296
scoring_system epss
scoring_elements 0.52876
published_at 2026-04-04T12:55:00Z
7
value 0.00296
scoring_system epss
scoring_elements 0.5285
published_at 2026-04-02T12:55:00Z
8
value 0.00296
scoring_system epss
scoring_elements 0.52844
published_at 2026-04-07T12:55:00Z
9
value 0.00296
scoring_system epss
scoring_elements 0.52895
published_at 2026-04-08T12:55:00Z
10
value 0.00296
scoring_system epss
scoring_elements 0.52889
published_at 2026-04-09T12:55:00Z
11
value 0.00296
scoring_system epss
scoring_elements 0.52939
published_at 2026-04-11T12:55:00Z
12
value 0.00296
scoring_system epss
scoring_elements 0.52923
published_at 2026-04-12T12:55:00Z
13
value 0.00296
scoring_system epss
scoring_elements 0.52907
published_at 2026-04-13T12:55:00Z
14
value 0.00296
scoring_system epss
scoring_elements 0.52944
published_at 2026-04-16T12:55:00Z
15
value 0.00296
scoring_system epss
scoring_elements 0.52951
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4049
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228364
reference_id 2228364
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2228364
11
reference_url https://www.debian.org/security/2023/dsa-5464
reference_id dsa-5464
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/
url https://www.debian.org/security/2023/dsa-5464
12
reference_url https://www.debian.org/security/2023/dsa-5469
reference_id dsa-5469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/
url https://www.debian.org/security/2023/dsa-5469
13
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
15
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
reference_id mfsa2023-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
17
reference_url https://www.mozilla.org/security/advisories/mfsa2023-30/
reference_id mfsa2023-30
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/
url https://www.mozilla.org/security/advisories/mfsa2023-30/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
reference_id mfsa2023-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
19
reference_url https://www.mozilla.org/security/advisories/mfsa2023-31/
reference_id mfsa2023-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/
url https://www.mozilla.org/security/advisories/mfsa2023-31/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
reference_id mfsa2023-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
reference_id mfsa2023-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
22
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
23
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
24
reference_url https://access.redhat.com/errata/RHSA-2023:4460
reference_id RHSA-2023:4460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4460
25
reference_url https://access.redhat.com/errata/RHSA-2023:4461
reference_id RHSA-2023:4461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4461
26
reference_url https://access.redhat.com/errata/RHSA-2023:4462
reference_id RHSA-2023:4462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4462
27
reference_url https://access.redhat.com/errata/RHSA-2023:4463
reference_id RHSA-2023:4463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4463
28
reference_url https://access.redhat.com/errata/RHSA-2023:4464
reference_id RHSA-2023:4464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4464
29
reference_url https://access.redhat.com/errata/RHSA-2023:4465
reference_id RHSA-2023:4465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4465
30
reference_url https://access.redhat.com/errata/RHSA-2023:4468
reference_id RHSA-2023:4468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4468
31
reference_url https://access.redhat.com/errata/RHSA-2023:4469
reference_id RHSA-2023:4469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4469
32
reference_url https://access.redhat.com/errata/RHSA-2023:4492
reference_id RHSA-2023:4492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4492
33
reference_url https://access.redhat.com/errata/RHSA-2023:4493
reference_id RHSA-2023:4493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4493
34
reference_url https://access.redhat.com/errata/RHSA-2023:4494
reference_id RHSA-2023:4494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4494
35
reference_url https://access.redhat.com/errata/RHSA-2023:4495
reference_id RHSA-2023:4495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4495
36
reference_url https://access.redhat.com/errata/RHSA-2023:4496
reference_id RHSA-2023:4496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4496
37
reference_url https://access.redhat.com/errata/RHSA-2023:4497
reference_id RHSA-2023:4497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4497
38
reference_url https://access.redhat.com/errata/RHSA-2023:4499
reference_id RHSA-2023:4499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4499
39
reference_url https://access.redhat.com/errata/RHSA-2023:4500
reference_id RHSA-2023:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4500
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1842658
reference_id show_bug.cgi?id=1842658
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1842658
41
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
42
reference_url https://usn.ubuntu.com/6333-1/
reference_id USN-6333-1
reference_type
scores
url https://usn.ubuntu.com/6333-1/
fixed_packages
0
url pkg:deb/debian/firefox@116.0-1?distro=sid
purl pkg:deb/debian/firefox@116.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@116.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
aliases CVE-2023-4049
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-878b-mn4w-wkg4
5
url VCID-8dgu-ppan-9ub2
vulnerability_id VCID-8dgu-ppan-9ub2
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4048.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4048.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4048
reference_id
reference_type
scores
0
value 0.00308
scoring_system epss
scoring_elements 0.54021
published_at 2026-04-21T12:55:00Z
1
value 0.00308
scoring_system epss
scoring_elements 0.53917
published_at 2026-05-05T12:55:00Z
2
value 0.00308
scoring_system epss
scoring_elements 0.53987
published_at 2026-04-24T12:55:00Z
3
value 0.00308
scoring_system epss
scoring_elements 0.53999
published_at 2026-04-26T12:55:00Z
4
value 0.00308
scoring_system epss
scoring_elements 0.5396
published_at 2026-05-07T12:55:00Z
5
value 0.00308
scoring_system epss
scoring_elements 0.53969
published_at 2026-04-29T12:55:00Z
6
value 0.00459
scoring_system epss
scoring_elements 0.6404
published_at 2026-04-04T12:55:00Z
7
value 0.00459
scoring_system epss
scoring_elements 0.64012
published_at 2026-04-02T12:55:00Z
8
value 0.00459
scoring_system epss
scoring_elements 0.64
published_at 2026-04-07T12:55:00Z
9
value 0.00459
scoring_system epss
scoring_elements 0.64051
published_at 2026-04-08T12:55:00Z
10
value 0.00459
scoring_system epss
scoring_elements 0.64067
published_at 2026-04-09T12:55:00Z
11
value 0.00459
scoring_system epss
scoring_elements 0.64079
published_at 2026-04-11T12:55:00Z
12
value 0.00459
scoring_system epss
scoring_elements 0.64065
published_at 2026-04-12T12:55:00Z
13
value 0.00459
scoring_system epss
scoring_elements 0.64036
published_at 2026-04-13T12:55:00Z
14
value 0.00459
scoring_system epss
scoring_elements 0.6407
published_at 2026-04-16T12:55:00Z
15
value 0.00459
scoring_system epss
scoring_elements 0.64082
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4048
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228363
reference_id 2228363
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2228363
11
reference_url https://www.debian.org/security/2023/dsa-5464
reference_id dsa-5464
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/
url https://www.debian.org/security/2023/dsa-5464
12
reference_url https://www.debian.org/security/2023/dsa-5469
reference_id dsa-5469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/
url https://www.debian.org/security/2023/dsa-5469
13
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
15
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
reference_id mfsa2023-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
17
reference_url https://www.mozilla.org/security/advisories/mfsa2023-30/
reference_id mfsa2023-30
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/
url https://www.mozilla.org/security/advisories/mfsa2023-30/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
reference_id mfsa2023-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
19
reference_url https://www.mozilla.org/security/advisories/mfsa2023-31/
reference_id mfsa2023-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/
url https://www.mozilla.org/security/advisories/mfsa2023-31/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
reference_id mfsa2023-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
reference_id mfsa2023-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
22
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
23
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
24
reference_url https://access.redhat.com/errata/RHSA-2023:4460
reference_id RHSA-2023:4460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4460
25
reference_url https://access.redhat.com/errata/RHSA-2023:4461
reference_id RHSA-2023:4461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4461
26
reference_url https://access.redhat.com/errata/RHSA-2023:4462
reference_id RHSA-2023:4462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4462
27
reference_url https://access.redhat.com/errata/RHSA-2023:4463
reference_id RHSA-2023:4463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4463
28
reference_url https://access.redhat.com/errata/RHSA-2023:4464
reference_id RHSA-2023:4464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4464
29
reference_url https://access.redhat.com/errata/RHSA-2023:4465
reference_id RHSA-2023:4465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4465
30
reference_url https://access.redhat.com/errata/RHSA-2023:4468
reference_id RHSA-2023:4468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4468
31
reference_url https://access.redhat.com/errata/RHSA-2023:4469
reference_id RHSA-2023:4469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4469
32
reference_url https://access.redhat.com/errata/RHSA-2023:4492
reference_id RHSA-2023:4492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4492
33
reference_url https://access.redhat.com/errata/RHSA-2023:4493
reference_id RHSA-2023:4493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4493
34
reference_url https://access.redhat.com/errata/RHSA-2023:4494
reference_id RHSA-2023:4494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4494
35
reference_url https://access.redhat.com/errata/RHSA-2023:4495
reference_id RHSA-2023:4495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4495
36
reference_url https://access.redhat.com/errata/RHSA-2023:4496
reference_id RHSA-2023:4496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4496
37
reference_url https://access.redhat.com/errata/RHSA-2023:4497
reference_id RHSA-2023:4497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4497
38
reference_url https://access.redhat.com/errata/RHSA-2023:4499
reference_id RHSA-2023:4499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4499
39
reference_url https://access.redhat.com/errata/RHSA-2023:4500
reference_id RHSA-2023:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4500
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1841368
reference_id show_bug.cgi?id=1841368
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1841368
41
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
42
reference_url https://usn.ubuntu.com/6333-1/
reference_id USN-6333-1
reference_type
scores
url https://usn.ubuntu.com/6333-1/
fixed_packages
0
url pkg:deb/debian/firefox@116.0-1?distro=sid
purl pkg:deb/debian/firefox@116.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@116.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
aliases CVE-2023-4048
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8dgu-ppan-9ub2
6
url VCID-m2sr-re2h-3baq
vulnerability_id VCID-m2sr-re2h-3baq
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4050.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4050.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4050
reference_id
reference_type
scores
0
value 0.03401
scoring_system epss
scoring_elements 0.87483
published_at 2026-05-07T12:55:00Z
1
value 0.03401
scoring_system epss
scoring_elements 0.87432
published_at 2026-04-21T12:55:00Z
2
value 0.03401
scoring_system epss
scoring_elements 0.87469
published_at 2026-05-05T12:55:00Z
3
value 0.03401
scoring_system epss
scoring_elements 0.87455
published_at 2026-04-29T12:55:00Z
4
value 0.03401
scoring_system epss
scoring_elements 0.87448
published_at 2026-04-24T12:55:00Z
5
value 0.04614
scoring_system epss
scoring_elements 0.89235
published_at 2026-04-07T12:55:00Z
6
value 0.04614
scoring_system epss
scoring_elements 0.89218
published_at 2026-04-02T12:55:00Z
7
value 0.04614
scoring_system epss
scoring_elements 0.89233
published_at 2026-04-04T12:55:00Z
8
value 0.04614
scoring_system epss
scoring_elements 0.89253
published_at 2026-04-08T12:55:00Z
9
value 0.04614
scoring_system epss
scoring_elements 0.89273
published_at 2026-04-18T12:55:00Z
10
value 0.04614
scoring_system epss
scoring_elements 0.8926
published_at 2026-04-13T12:55:00Z
11
value 0.04614
scoring_system epss
scoring_elements 0.89263
published_at 2026-04-12T12:55:00Z
12
value 0.04614
scoring_system epss
scoring_elements 0.89267
published_at 2026-04-11T12:55:00Z
13
value 0.04614
scoring_system epss
scoring_elements 0.89257
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4050
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228365
reference_id 2228365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2228365
11
reference_url https://www.debian.org/security/2023/dsa-5464
reference_id dsa-5464
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/
url https://www.debian.org/security/2023/dsa-5464
12
reference_url https://www.debian.org/security/2023/dsa-5469
reference_id dsa-5469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/
url https://www.debian.org/security/2023/dsa-5469
13
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
15
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
reference_id mfsa2023-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
17
reference_url https://www.mozilla.org/security/advisories/mfsa2023-30/
reference_id mfsa2023-30
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/
url https://www.mozilla.org/security/advisories/mfsa2023-30/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
reference_id mfsa2023-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
19
reference_url https://www.mozilla.org/security/advisories/mfsa2023-31/
reference_id mfsa2023-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/
url https://www.mozilla.org/security/advisories/mfsa2023-31/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
reference_id mfsa2023-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
reference_id mfsa2023-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
22
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
23
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
24
reference_url https://access.redhat.com/errata/RHSA-2023:4460
reference_id RHSA-2023:4460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4460
25
reference_url https://access.redhat.com/errata/RHSA-2023:4461
reference_id RHSA-2023:4461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4461
26
reference_url https://access.redhat.com/errata/RHSA-2023:4462
reference_id RHSA-2023:4462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4462
27
reference_url https://access.redhat.com/errata/RHSA-2023:4463
reference_id RHSA-2023:4463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4463
28
reference_url https://access.redhat.com/errata/RHSA-2023:4464
reference_id RHSA-2023:4464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4464
29
reference_url https://access.redhat.com/errata/RHSA-2023:4465
reference_id RHSA-2023:4465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4465
30
reference_url https://access.redhat.com/errata/RHSA-2023:4468
reference_id RHSA-2023:4468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4468
31
reference_url https://access.redhat.com/errata/RHSA-2023:4469
reference_id RHSA-2023:4469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4469
32
reference_url https://access.redhat.com/errata/RHSA-2023:4492
reference_id RHSA-2023:4492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4492
33
reference_url https://access.redhat.com/errata/RHSA-2023:4493
reference_id RHSA-2023:4493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4493
34
reference_url https://access.redhat.com/errata/RHSA-2023:4494
reference_id RHSA-2023:4494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4494
35
reference_url https://access.redhat.com/errata/RHSA-2023:4495
reference_id RHSA-2023:4495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4495
36
reference_url https://access.redhat.com/errata/RHSA-2023:4496
reference_id RHSA-2023:4496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4496
37
reference_url https://access.redhat.com/errata/RHSA-2023:4497
reference_id RHSA-2023:4497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4497
38
reference_url https://access.redhat.com/errata/RHSA-2023:4499
reference_id RHSA-2023:4499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4499
39
reference_url https://access.redhat.com/errata/RHSA-2023:4500
reference_id RHSA-2023:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4500
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1843038
reference_id show_bug.cgi?id=1843038
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1843038
41
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
42
reference_url https://usn.ubuntu.com/6333-1/
reference_id USN-6333-1
reference_type
scores
url https://usn.ubuntu.com/6333-1/
fixed_packages
0
url pkg:deb/debian/firefox@116.0-1?distro=sid
purl pkg:deb/debian/firefox@116.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@116.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
aliases CVE-2023-4050
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m2sr-re2h-3baq
7
url VCID-sh7r-dftz-kyhn
vulnerability_id VCID-sh7r-dftz-kyhn
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4045.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4045.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4045
reference_id
reference_type
scores
0
value 0.00235
scoring_system epss
scoring_elements 0.46448
published_at 2026-04-24T12:55:00Z
1
value 0.00235
scoring_system epss
scoring_elements 0.46311
published_at 2026-05-05T12:55:00Z
2
value 0.00235
scoring_system epss
scoring_elements 0.46377
published_at 2026-05-07T12:55:00Z
3
value 0.00235
scoring_system epss
scoring_elements 0.46459
published_at 2026-04-26T12:55:00Z
4
value 0.00235
scoring_system epss
scoring_elements 0.46466
published_at 2026-04-21T12:55:00Z
5
value 0.00235
scoring_system epss
scoring_elements 0.46406
published_at 2026-04-29T12:55:00Z
6
value 0.00325
scoring_system epss
scoring_elements 0.55526
published_at 2026-04-09T12:55:00Z
7
value 0.00325
scoring_system epss
scoring_elements 0.55471
published_at 2026-04-02T12:55:00Z
8
value 0.00325
scoring_system epss
scoring_elements 0.55496
published_at 2026-04-04T12:55:00Z
9
value 0.00325
scoring_system epss
scoring_elements 0.55474
published_at 2026-04-07T12:55:00Z
10
value 0.00325
scoring_system epss
scoring_elements 0.55535
published_at 2026-04-11T12:55:00Z
11
value 0.00325
scoring_system epss
scoring_elements 0.55538
published_at 2026-04-18T12:55:00Z
12
value 0.00325
scoring_system epss
scoring_elements 0.55534
published_at 2026-04-16T12:55:00Z
13
value 0.00325
scoring_system epss
scoring_elements 0.55498
published_at 2026-04-13T12:55:00Z
14
value 0.00325
scoring_system epss
scoring_elements 0.55515
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4045
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228360
reference_id 2228360
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2228360
12
reference_url https://www.debian.org/security/2023/dsa-5464
reference_id dsa-5464
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/
url https://www.debian.org/security/2023/dsa-5464
13
reference_url https://www.debian.org/security/2023/dsa-5469
reference_id dsa-5469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/
url https://www.debian.org/security/2023/dsa-5469
14
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
reference_id mfsa2023-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
18
reference_url https://www.mozilla.org/security/advisories/mfsa2023-30/
reference_id mfsa2023-30
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/
url https://www.mozilla.org/security/advisories/mfsa2023-30/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
reference_id mfsa2023-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
20
reference_url https://www.mozilla.org/security/advisories/mfsa2023-31/
reference_id mfsa2023-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/
url https://www.mozilla.org/security/advisories/mfsa2023-31/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
reference_id mfsa2023-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
reference_id mfsa2023-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
23
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
24
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
25
reference_url https://access.redhat.com/errata/RHSA-2023:4460
reference_id RHSA-2023:4460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4460
26
reference_url https://access.redhat.com/errata/RHSA-2023:4461
reference_id RHSA-2023:4461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4461
27
reference_url https://access.redhat.com/errata/RHSA-2023:4462
reference_id RHSA-2023:4462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4462
28
reference_url https://access.redhat.com/errata/RHSA-2023:4463
reference_id RHSA-2023:4463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4463
29
reference_url https://access.redhat.com/errata/RHSA-2023:4464
reference_id RHSA-2023:4464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4464
30
reference_url https://access.redhat.com/errata/RHSA-2023:4465
reference_id RHSA-2023:4465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4465
31
reference_url https://access.redhat.com/errata/RHSA-2023:4468
reference_id RHSA-2023:4468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4468
32
reference_url https://access.redhat.com/errata/RHSA-2023:4469
reference_id RHSA-2023:4469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4469
33
reference_url https://access.redhat.com/errata/RHSA-2023:4492
reference_id RHSA-2023:4492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4492
34
reference_url https://access.redhat.com/errata/RHSA-2023:4493
reference_id RHSA-2023:4493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4493
35
reference_url https://access.redhat.com/errata/RHSA-2023:4494
reference_id RHSA-2023:4494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4494
36
reference_url https://access.redhat.com/errata/RHSA-2023:4495
reference_id RHSA-2023:4495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4495
37
reference_url https://access.redhat.com/errata/RHSA-2023:4496
reference_id RHSA-2023:4496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4496
38
reference_url https://access.redhat.com/errata/RHSA-2023:4497
reference_id RHSA-2023:4497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4497
39
reference_url https://access.redhat.com/errata/RHSA-2023:4499
reference_id RHSA-2023:4499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4499
40
reference_url https://access.redhat.com/errata/RHSA-2023:4500
reference_id RHSA-2023:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4500
41
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1833876
reference_id show_bug.cgi?id=1833876
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1833876
42
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
43
reference_url https://usn.ubuntu.com/6333-1/
reference_id USN-6333-1
reference_type
scores
url https://usn.ubuntu.com/6333-1/
fixed_packages
0
url pkg:deb/debian/firefox@116.0-1?distro=sid
purl pkg:deb/debian/firefox@116.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@116.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
aliases CVE-2023-4045
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sh7r-dftz-kyhn
8
url VCID-t8gg-ptc1-qfdw
vulnerability_id VCID-t8gg-ptc1-qfdw
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4056.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4056.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4056
reference_id
reference_type
scores
0
value 0.00605
scoring_system epss
scoring_elements 0.69638
published_at 2026-04-21T12:55:00Z
1
value 0.00605
scoring_system epss
scoring_elements 0.6968
published_at 2026-05-05T12:55:00Z
2
value 0.00605
scoring_system epss
scoring_elements 0.69691
published_at 2026-04-24T12:55:00Z
3
value 0.00605
scoring_system epss
scoring_elements 0.69699
published_at 2026-04-26T12:55:00Z
4
value 0.00605
scoring_system epss
scoring_elements 0.69724
published_at 2026-05-07T12:55:00Z
5
value 0.00605
scoring_system epss
scoring_elements 0.69704
published_at 2026-04-29T12:55:00Z
6
value 0.00667
scoring_system epss
scoring_elements 0.71232
published_at 2026-04-04T12:55:00Z
7
value 0.00667
scoring_system epss
scoring_elements 0.71214
published_at 2026-04-02T12:55:00Z
8
value 0.00667
scoring_system epss
scoring_elements 0.71207
published_at 2026-04-07T12:55:00Z
9
value 0.00667
scoring_system epss
scoring_elements 0.71249
published_at 2026-04-08T12:55:00Z
10
value 0.00667
scoring_system epss
scoring_elements 0.71263
published_at 2026-04-09T12:55:00Z
11
value 0.00667
scoring_system epss
scoring_elements 0.71286
published_at 2026-04-11T12:55:00Z
12
value 0.00667
scoring_system epss
scoring_elements 0.7127
published_at 2026-04-12T12:55:00Z
13
value 0.00667
scoring_system epss
scoring_elements 0.71255
published_at 2026-04-13T12:55:00Z
14
value 0.00667
scoring_system epss
scoring_elements 0.713
published_at 2026-04-16T12:55:00Z
15
value 0.00667
scoring_system epss
scoring_elements 0.71307
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4056
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228370
reference_id 2228370
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2228370
11
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1820587%2C1824634%2C1839235%2C1842325%2C1843847
reference_id buglist.cgi?bug_id=1820587%2C1824634%2C1839235%2C1842325%2C1843847
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1820587%2C1824634%2C1839235%2C1842325%2C1843847
12
reference_url https://www.debian.org/security/2023/dsa-5464
reference_id dsa-5464
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/
url https://www.debian.org/security/2023/dsa-5464
13
reference_url https://www.debian.org/security/2023/dsa-5469
reference_id dsa-5469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/
url https://www.debian.org/security/2023/dsa-5469
14
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
reference_id mfsa2023-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
18
reference_url https://www.mozilla.org/security/advisories/mfsa2023-30/
reference_id mfsa2023-30
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/
url https://www.mozilla.org/security/advisories/mfsa2023-30/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
reference_id mfsa2023-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
20
reference_url https://www.mozilla.org/security/advisories/mfsa2023-31/
reference_id mfsa2023-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/
url https://www.mozilla.org/security/advisories/mfsa2023-31/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
reference_id mfsa2023-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
reference_id mfsa2023-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
23
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
24
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
25
reference_url https://access.redhat.com/errata/RHSA-2023:4460
reference_id RHSA-2023:4460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4460
26
reference_url https://access.redhat.com/errata/RHSA-2023:4461
reference_id RHSA-2023:4461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4461
27
reference_url https://access.redhat.com/errata/RHSA-2023:4462
reference_id RHSA-2023:4462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4462
28
reference_url https://access.redhat.com/errata/RHSA-2023:4463
reference_id RHSA-2023:4463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4463
29
reference_url https://access.redhat.com/errata/RHSA-2023:4464
reference_id RHSA-2023:4464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4464
30
reference_url https://access.redhat.com/errata/RHSA-2023:4465
reference_id RHSA-2023:4465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4465
31
reference_url https://access.redhat.com/errata/RHSA-2023:4468
reference_id RHSA-2023:4468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4468
32
reference_url https://access.redhat.com/errata/RHSA-2023:4469
reference_id RHSA-2023:4469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4469
33
reference_url https://access.redhat.com/errata/RHSA-2023:4492
reference_id RHSA-2023:4492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4492
34
reference_url https://access.redhat.com/errata/RHSA-2023:4493
reference_id RHSA-2023:4493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4493
35
reference_url https://access.redhat.com/errata/RHSA-2023:4494
reference_id RHSA-2023:4494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4494
36
reference_url https://access.redhat.com/errata/RHSA-2023:4495
reference_id RHSA-2023:4495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4495
37
reference_url https://access.redhat.com/errata/RHSA-2023:4496
reference_id RHSA-2023:4496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4496
38
reference_url https://access.redhat.com/errata/RHSA-2023:4497
reference_id RHSA-2023:4497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4497
39
reference_url https://access.redhat.com/errata/RHSA-2023:4499
reference_id RHSA-2023:4499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4499
40
reference_url https://access.redhat.com/errata/RHSA-2023:4500
reference_id RHSA-2023:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4500
41
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
42
reference_url https://usn.ubuntu.com/6333-1/
reference_id USN-6333-1
reference_type
scores
url https://usn.ubuntu.com/6333-1/
fixed_packages
0
url pkg:deb/debian/firefox@116.0-1?distro=sid
purl pkg:deb/debian/firefox@116.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@116.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
aliases CVE-2023-4056
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t8gg-ptc1-qfdw
9
url VCID-vjw1-g5kk-zuda
vulnerability_id VCID-vjw1-g5kk-zuda
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4046.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4046.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4046
reference_id
reference_type
scores
0
value 0.00214
scoring_system epss
scoring_elements 0.43933
published_at 2026-04-21T12:55:00Z
1
value 0.00214
scoring_system epss
scoring_elements 0.43684
published_at 2026-05-05T12:55:00Z
2
value 0.00214
scoring_system epss
scoring_elements 0.43885
published_at 2026-04-24T12:55:00Z
3
value 0.00214
scoring_system epss
scoring_elements 0.43888
published_at 2026-04-26T12:55:00Z
4
value 0.00214
scoring_system epss
scoring_elements 0.43759
published_at 2026-05-07T12:55:00Z
5
value 0.00214
scoring_system epss
scoring_elements 0.43804
published_at 2026-04-29T12:55:00Z
6
value 0.00296
scoring_system epss
scoring_elements 0.5283
published_at 2026-04-04T12:55:00Z
7
value 0.00296
scoring_system epss
scoring_elements 0.52804
published_at 2026-04-02T12:55:00Z
8
value 0.00296
scoring_system epss
scoring_elements 0.52798
published_at 2026-04-07T12:55:00Z
9
value 0.00296
scoring_system epss
scoring_elements 0.52849
published_at 2026-04-08T12:55:00Z
10
value 0.00296
scoring_system epss
scoring_elements 0.52843
published_at 2026-04-09T12:55:00Z
11
value 0.00296
scoring_system epss
scoring_elements 0.52894
published_at 2026-04-11T12:55:00Z
12
value 0.00296
scoring_system epss
scoring_elements 0.52878
published_at 2026-04-12T12:55:00Z
13
value 0.00296
scoring_system epss
scoring_elements 0.52862
published_at 2026-04-13T12:55:00Z
14
value 0.00296
scoring_system epss
scoring_elements 0.52898
published_at 2026-04-16T12:55:00Z
15
value 0.00296
scoring_system epss
scoring_elements 0.52906
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4046
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228361
reference_id 2228361
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2228361
11
reference_url https://www.debian.org/security/2023/dsa-5464
reference_id dsa-5464
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/
url https://www.debian.org/security/2023/dsa-5464
12
reference_url https://www.debian.org/security/2023/dsa-5469
reference_id dsa-5469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/
url https://www.debian.org/security/2023/dsa-5469
13
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
15
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
reference_id mfsa2023-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
17
reference_url https://www.mozilla.org/security/advisories/mfsa2023-30/
reference_id mfsa2023-30
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/
url https://www.mozilla.org/security/advisories/mfsa2023-30/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
reference_id mfsa2023-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
19
reference_url https://www.mozilla.org/security/advisories/mfsa2023-31/
reference_id mfsa2023-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/
url https://www.mozilla.org/security/advisories/mfsa2023-31/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
reference_id mfsa2023-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
reference_id mfsa2023-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
22
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
23
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
24
reference_url https://access.redhat.com/errata/RHSA-2023:4460
reference_id RHSA-2023:4460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4460
25
reference_url https://access.redhat.com/errata/RHSA-2023:4461
reference_id RHSA-2023:4461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4461
26
reference_url https://access.redhat.com/errata/RHSA-2023:4462
reference_id RHSA-2023:4462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4462
27
reference_url https://access.redhat.com/errata/RHSA-2023:4463
reference_id RHSA-2023:4463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4463
28
reference_url https://access.redhat.com/errata/RHSA-2023:4464
reference_id RHSA-2023:4464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4464
29
reference_url https://access.redhat.com/errata/RHSA-2023:4465
reference_id RHSA-2023:4465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4465
30
reference_url https://access.redhat.com/errata/RHSA-2023:4468
reference_id RHSA-2023:4468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4468
31
reference_url https://access.redhat.com/errata/RHSA-2023:4469
reference_id RHSA-2023:4469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4469
32
reference_url https://access.redhat.com/errata/RHSA-2023:4492
reference_id RHSA-2023:4492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4492
33
reference_url https://access.redhat.com/errata/RHSA-2023:4493
reference_id RHSA-2023:4493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4493
34
reference_url https://access.redhat.com/errata/RHSA-2023:4494
reference_id RHSA-2023:4494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4494
35
reference_url https://access.redhat.com/errata/RHSA-2023:4495
reference_id RHSA-2023:4495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4495
36
reference_url https://access.redhat.com/errata/RHSA-2023:4496
reference_id RHSA-2023:4496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4496
37
reference_url https://access.redhat.com/errata/RHSA-2023:4497
reference_id RHSA-2023:4497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4497
38
reference_url https://access.redhat.com/errata/RHSA-2023:4499
reference_id RHSA-2023:4499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4499
39
reference_url https://access.redhat.com/errata/RHSA-2023:4500
reference_id RHSA-2023:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4500
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1837686
reference_id show_bug.cgi?id=1837686
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1837686
41
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
42
reference_url https://usn.ubuntu.com/6333-1/
reference_id USN-6333-1
reference_type
scores
url https://usn.ubuntu.com/6333-1/
43
reference_url https://usn.ubuntu.com/6406-1/
reference_id USN-6406-1
reference_type
scores
url https://usn.ubuntu.com/6406-1/
fixed_packages
0
url pkg:deb/debian/firefox@116.0-1?distro=sid
purl pkg:deb/debian/firefox@116.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@116.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
aliases CVE-2023-4046
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vjw1-g5kk-zuda
10
url VCID-xrg1-azru-5qf1
vulnerability_id VCID-xrg1-azru-5qf1
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4051.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4051.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4051
reference_id
reference_type
scores
0
value 0.0014
scoring_system epss
scoring_elements 0.34193
published_at 2026-04-18T12:55:00Z
1
value 0.0014
scoring_system epss
scoring_elements 0.34205
published_at 2026-04-16T12:55:00Z
2
value 0.0014
scoring_system epss
scoring_elements 0.34269
published_at 2026-04-02T12:55:00Z
3
value 0.0014
scoring_system epss
scoring_elements 0.34172
published_at 2026-04-13T12:55:00Z
4
value 0.0014
scoring_system epss
scoring_elements 0.34196
published_at 2026-04-12T12:55:00Z
5
value 0.0014
scoring_system epss
scoring_elements 0.34236
published_at 2026-04-11T12:55:00Z
6
value 0.0014
scoring_system epss
scoring_elements 0.34207
published_at 2026-04-08T12:55:00Z
7
value 0.0014
scoring_system epss
scoring_elements 0.34165
published_at 2026-04-07T12:55:00Z
8
value 0.0014
scoring_system epss
scoring_elements 0.34301
published_at 2026-04-04T12:55:00Z
9
value 0.00157
scoring_system epss
scoring_elements 0.36065
published_at 2026-05-07T12:55:00Z
10
value 0.00157
scoring_system epss
scoring_elements 0.3646
published_at 2026-04-21T12:55:00Z
11
value 0.00157
scoring_system epss
scoring_elements 0.36232
published_at 2026-04-24T12:55:00Z
12
value 0.00157
scoring_system epss
scoring_elements 0.36202
published_at 2026-04-26T12:55:00Z
13
value 0.00157
scoring_system epss
scoring_elements 0.36115
published_at 2026-04-29T12:55:00Z
14
value 0.00157
scoring_system epss
scoring_elements 0.35997
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4051
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236076
reference_id 2236076
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236076
3
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
5
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:40:45Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
reference_id mfsa2023-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
7
reference_url https://www.mozilla.org/security/advisories/mfsa2023-36/
reference_id mfsa2023-36
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:40:45Z/
url https://www.mozilla.org/security/advisories/mfsa2023-36/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
reference_id mfsa2023-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
9
reference_url https://www.mozilla.org/security/advisories/mfsa2023-38/
reference_id mfsa2023-38
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:40:45Z/
url https://www.mozilla.org/security/advisories/mfsa2023-38/
10
reference_url https://access.redhat.com/errata/RHSA-2023:4945
reference_id RHSA-2023:4945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4945
11
reference_url https://access.redhat.com/errata/RHSA-2023:4946
reference_id RHSA-2023:4946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4946
12
reference_url https://access.redhat.com/errata/RHSA-2023:4947
reference_id RHSA-2023:4947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4947
13
reference_url https://access.redhat.com/errata/RHSA-2023:4948
reference_id RHSA-2023:4948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4948
14
reference_url https://access.redhat.com/errata/RHSA-2023:4949
reference_id RHSA-2023:4949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4949
15
reference_url https://access.redhat.com/errata/RHSA-2023:4950
reference_id RHSA-2023:4950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4950
16
reference_url https://access.redhat.com/errata/RHSA-2023:4951
reference_id RHSA-2023:4951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4951
17
reference_url https://access.redhat.com/errata/RHSA-2023:4952
reference_id RHSA-2023:4952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4952
18
reference_url https://access.redhat.com/errata/RHSA-2023:4954
reference_id RHSA-2023:4954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4954
19
reference_url https://access.redhat.com/errata/RHSA-2023:4955
reference_id RHSA-2023:4955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4955
20
reference_url https://access.redhat.com/errata/RHSA-2023:4956
reference_id RHSA-2023:4956
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4956
21
reference_url https://access.redhat.com/errata/RHSA-2023:4957
reference_id RHSA-2023:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4957
22
reference_url https://access.redhat.com/errata/RHSA-2023:4958
reference_id RHSA-2023:4958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4958
23
reference_url https://access.redhat.com/errata/RHSA-2023:4959
reference_id RHSA-2023:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4959
24
reference_url https://access.redhat.com/errata/RHSA-2023:5019
reference_id RHSA-2023:5019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5019
25
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1821884
reference_id show_bug.cgi?id=1821884
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:40:45Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1821884
26
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
fixed_packages
0
url pkg:deb/debian/firefox@116.0-1?distro=sid
purl pkg:deb/debian/firefox@116.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@116.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
aliases CVE-2023-4051
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xrg1-azru-5qf1
11
url VCID-ygrd-4scr-wkau
vulnerability_id VCID-ygrd-4scr-wkau
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4053.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4053.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4053
reference_id
reference_type
scores
0
value 0.00145
scoring_system epss
scoring_elements 0.34406
published_at 2026-05-07T12:55:00Z
1
value 0.00145
scoring_system epss
scoring_elements 0.34865
published_at 2026-04-16T12:55:00Z
2
value 0.00145
scoring_system epss
scoring_elements 0.34849
published_at 2026-04-18T12:55:00Z
3
value 0.00145
scoring_system epss
scoring_elements 0.34805
published_at 2026-04-21T12:55:00Z
4
value 0.00145
scoring_system epss
scoring_elements 0.34567
published_at 2026-04-24T12:55:00Z
5
value 0.00145
scoring_system epss
scoring_elements 0.34547
published_at 2026-04-26T12:55:00Z
6
value 0.00145
scoring_system epss
scoring_elements 0.3446
published_at 2026-04-29T12:55:00Z
7
value 0.00145
scoring_system epss
scoring_elements 0.34335
published_at 2026-05-05T12:55:00Z
8
value 0.00145
scoring_system epss
scoring_elements 0.34904
published_at 2026-04-02T12:55:00Z
9
value 0.00145
scoring_system epss
scoring_elements 0.34931
published_at 2026-04-04T12:55:00Z
10
value 0.00145
scoring_system epss
scoring_elements 0.3481
published_at 2026-04-07T12:55:00Z
11
value 0.00145
scoring_system epss
scoring_elements 0.34855
published_at 2026-04-08T12:55:00Z
12
value 0.00145
scoring_system epss
scoring_elements 0.34884
published_at 2026-04-09T12:55:00Z
13
value 0.00145
scoring_system epss
scoring_elements 0.34887
published_at 2026-04-11T12:55:00Z
14
value 0.00145
scoring_system epss
scoring_elements 0.3485
published_at 2026-04-12T12:55:00Z
15
value 0.00145
scoring_system epss
scoring_elements 0.34826
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4053
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236078
reference_id 2236078
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236078
3
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
5
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:53Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
reference_id mfsa2023-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
7
reference_url https://www.mozilla.org/security/advisories/mfsa2023-36/
reference_id mfsa2023-36
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:53Z/
url https://www.mozilla.org/security/advisories/mfsa2023-36/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
reference_id mfsa2023-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
9
reference_url https://www.mozilla.org/security/advisories/mfsa2023-38/
reference_id mfsa2023-38
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:53Z/
url https://www.mozilla.org/security/advisories/mfsa2023-38/
10
reference_url https://access.redhat.com/errata/RHSA-2023:4945
reference_id RHSA-2023:4945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4945
11
reference_url https://access.redhat.com/errata/RHSA-2023:4946
reference_id RHSA-2023:4946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4946
12
reference_url https://access.redhat.com/errata/RHSA-2023:4947
reference_id RHSA-2023:4947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4947
13
reference_url https://access.redhat.com/errata/RHSA-2023:4948
reference_id RHSA-2023:4948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4948
14
reference_url https://access.redhat.com/errata/RHSA-2023:4949
reference_id RHSA-2023:4949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4949
15
reference_url https://access.redhat.com/errata/RHSA-2023:4950
reference_id RHSA-2023:4950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4950
16
reference_url https://access.redhat.com/errata/RHSA-2023:4951
reference_id RHSA-2023:4951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4951
17
reference_url https://access.redhat.com/errata/RHSA-2023:4952
reference_id RHSA-2023:4952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4952
18
reference_url https://access.redhat.com/errata/RHSA-2023:4954
reference_id RHSA-2023:4954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4954
19
reference_url https://access.redhat.com/errata/RHSA-2023:4955
reference_id RHSA-2023:4955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4955
20
reference_url https://access.redhat.com/errata/RHSA-2023:4956
reference_id RHSA-2023:4956
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4956
21
reference_url https://access.redhat.com/errata/RHSA-2023:4957
reference_id RHSA-2023:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4957
22
reference_url https://access.redhat.com/errata/RHSA-2023:4958
reference_id RHSA-2023:4958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4958
23
reference_url https://access.redhat.com/errata/RHSA-2023:4959
reference_id RHSA-2023:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4959
24
reference_url https://access.redhat.com/errata/RHSA-2023:5019
reference_id RHSA-2023:5019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5019
25
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1839079
reference_id show_bug.cgi?id=1839079
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:53Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1839079
26
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
fixed_packages
0
url pkg:deb/debian/firefox@116.0-1?distro=sid
purl pkg:deb/debian/firefox@116.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@116.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
aliases CVE-2023-4053
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ygrd-4scr-wkau
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@116.0-1%3Fdistro=sid