{"url":"http://public2.vulnerablecode.io/api/packages/584343?format=json","purl":"pkg:deb/debian/firefox@124.0-1?distro=sid","type":"deb","namespace":"debian","name":"firefox","version":"124.0-1","qualifiers":{"distro":"sid"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"124.0.1-1","latest_non_vulnerable_version":"150.0.3-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46594?format=json","vulnerability_id":"VCID-2tts-gwgd-zqcz","summary":"A vulnerability has been discovered in NSS, which can lead to the recovery of private data.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5388.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5388.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5388","reference_id":"","reference_type":"","scores":[{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39691","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47739","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47725","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47653","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47677","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47732","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47727","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47752","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47729","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47794","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47623","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47681","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47658","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47593","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.4773","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47721","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47787","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056284","reference_id":"1056284","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056284"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2243644","reference_id":"2243644","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2243644"},{"reference_url":"https://security.gentoo.org/glsa/202508-04","reference_id":"GLSA-202508-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202508-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-12/","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-12/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-13","reference_id":"mfsa2024-13","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-13"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-13/","reference_id":"mfsa2024-13","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-13/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-14","reference_id":"mfsa2024-14","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-14"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-14/","reference_id":"mfsa2024-14","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-14/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html","reference_id":"msg00028.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0093","reference_id":"RHSA-2024:0093","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0093"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0105","reference_id":"RHSA-2024:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0105"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0106","reference_id":"RHSA-2024:0106","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0106"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0107","reference_id":"RHSA-2024:0107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0108","reference_id":"RHSA-2024:0108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1483","reference_id":"RHSA-2024:1483","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1483"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1484","reference_id":"RHSA-2024:1484","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1484"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1485","reference_id":"RHSA-2024:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1486","reference_id":"RHSA-2024:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1487","reference_id":"RHSA-2024:1487","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1488","reference_id":"RHSA-2024:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1489","reference_id":"RHSA-2024:1489","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1490","reference_id":"RHSA-2024:1490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1491","reference_id":"RHSA-2024:1491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1492","reference_id":"RHSA-2024:1492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1493","reference_id":"RHSA-2024:1493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1494","reference_id":"RHSA-2024:1494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1495","reference_id":"RHSA-2024:1495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1496","reference_id":"RHSA-2024:1496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1497","reference_id":"RHSA-2024:1497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1498","reference_id":"RHSA-2024:1498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1499","reference_id":"RHSA-2024:1499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1500","reference_id":"RHSA-2024:1500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1500"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1780432","reference_id":"show_bug.cgi?id=1780432","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1780432"},{"reference_url":"https://usn.ubuntu.com/6703-1/","reference_id":"USN-6703-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6703-1/"},{"reference_url":"https://usn.ubuntu.com/6717-1/","reference_id":"USN-6717-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6717-1/"},{"reference_url":"https://usn.ubuntu.com/6727-1/","reference_id":"USN-6727-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6727-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584343?format=json","purl":"pkg:deb/debian/firefox@124.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1112518?format=json","purl":"pkg:deb/debian/firefox@150.0.3-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.3-1%3Fdistro=sid"}],"aliases":["CVE-2023-5388"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2tts-gwgd-zqcz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47588?format=json","vulnerability_id":"VCID-2zdh-azdw-tuav","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2609.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2609.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2609","reference_id":"","reference_type":"","scores":[{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.77475","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.77429","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.7741","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.7742","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.77399","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.77372","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.77364","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.77352","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.77312","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.77346","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.78151","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.78121","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.78133","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.78159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.78166","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.78191","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.78174","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.7817","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.78203","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.78201","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275551","reference_id":"2275551","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275551"},{"reference_url":"https://security.gentoo.org/glsa/202405-32","reference_id":"GLSA-202405-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-32"},{"reference_url":"https://security.gentoo.org/glsa/202407-19","reference_id":"GLSA-202407-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-19"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-12/","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T15:04:02Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-12/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-19","reference_id":"mfsa2024-19","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-19"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-19/","reference_id":"mfsa2024-19","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T15:04:02Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-19/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-20","reference_id":"mfsa2024-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-20"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-20/","reference_id":"mfsa2024-20","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T15:04:02Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-20/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html","reference_id":"msg00012.html","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T15:04:02Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html","reference_id":"msg00013.html","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T15:04:02Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1904","reference_id":"RHSA-2024:1904","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1904"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1905","reference_id":"RHSA-2024:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1906","reference_id":"RHSA-2024:1906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1907","reference_id":"RHSA-2024:1907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1908","reference_id":"RHSA-2024:1908","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1908"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1909","reference_id":"RHSA-2024:1909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1910","reference_id":"RHSA-2024:1910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1911","reference_id":"RHSA-2024:1911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1912","reference_id":"RHSA-2024:1912","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1912"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1934","reference_id":"RHSA-2024:1934","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1934"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1935","reference_id":"RHSA-2024:1935","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1935"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1936","reference_id":"RHSA-2024:1936","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1936"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1937","reference_id":"RHSA-2024:1937","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1937"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1938","reference_id":"RHSA-2024:1938","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1938"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1939","reference_id":"RHSA-2024:1939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1940","reference_id":"RHSA-2024:1940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1941","reference_id":"RHSA-2024:1941","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1982","reference_id":"RHSA-2024:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1982"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1866100","reference_id":"show_bug.cgi?id=1866100","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T15:04:02Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1866100"},{"reference_url":"https://usn.ubuntu.com/6703-1/","reference_id":"USN-6703-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6703-1/"},{"reference_url":"https://usn.ubuntu.com/6750-1/","reference_id":"USN-6750-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6750-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584343?format=json","purl":"pkg:deb/debian/firefox@124.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1112518?format=json","purl":"pkg:deb/debian/firefox@150.0.3-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.3-1%3Fdistro=sid"}],"aliases":["CVE-2024-2609"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2zdh-azdw-tuav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62634?format=json","vulnerability_id":"VCID-3vbp-2h4f-7bav","summary":"A missing delay on when pointer lock was used could have allowed a malicious page to trick a user into granting permissions.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2611.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2611.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2611","reference_id":"","reference_type":"","scores":[{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46894","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46877","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55406","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55341","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55392","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55391","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55402","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.5538","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55362","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55397","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55401","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55318","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55339","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55311","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.5526","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55303","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55359","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.5532","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55345","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270664","reference_id":"2270664","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270664"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-12/","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-12/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-13","reference_id":"mfsa2024-13","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-13"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-13/","reference_id":"mfsa2024-13","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-13/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-14","reference_id":"mfsa2024-14","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-14"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-14/","reference_id":"mfsa2024-14","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-14/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html","reference_id":"msg00028.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1483","reference_id":"RHSA-2024:1483","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1483"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1484","reference_id":"RHSA-2024:1484","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1484"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1485","reference_id":"RHSA-2024:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1486","reference_id":"RHSA-2024:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1487","reference_id":"RHSA-2024:1487","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1488","reference_id":"RHSA-2024:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1489","reference_id":"RHSA-2024:1489","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1490","reference_id":"RHSA-2024:1490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1491","reference_id":"RHSA-2024:1491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1492","reference_id":"RHSA-2024:1492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1493","reference_id":"RHSA-2024:1493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1494","reference_id":"RHSA-2024:1494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1495","reference_id":"RHSA-2024:1495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1496","reference_id":"RHSA-2024:1496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1497","reference_id":"RHSA-2024:1497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1498","reference_id":"RHSA-2024:1498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1499","reference_id":"RHSA-2024:1499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1500","reference_id":"RHSA-2024:1500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1500"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1876675","reference_id":"show_bug.cgi?id=1876675","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1876675"},{"reference_url":"https://usn.ubuntu.com/6703-1/","reference_id":"USN-6703-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6703-1/"},{"reference_url":"https://usn.ubuntu.com/6717-1/","reference_id":"USN-6717-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6717-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584343?format=json","purl":"pkg:deb/debian/firefox@124.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1112518?format=json","purl":"pkg:deb/debian/firefox@150.0.3-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.3-1%3Fdistro=sid"}],"aliases":["CVE-2024-2611"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3vbp-2h4f-7bav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62637?format=json","vulnerability_id":"VCID-41g2-dvb2-yqhg","summary":"Memory safety bugs present in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2614.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2614.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2614","reference_id":"","reference_type":"","scores":[{"value":"0.01437","scoring_system":"epss","scoring_elements":"0.80795","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01437","scoring_system":"epss","scoring_elements":"0.80778","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01437","scoring_system":"epss","scoring_elements":"0.80764","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01437","scoring_system":"epss","scoring_elements":"0.8076","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01437","scoring_system":"epss","scoring_elements":"0.80738","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01437","scoring_system":"epss","scoring_elements":"0.80734","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01437","scoring_system":"epss","scoring_elements":"0.80699","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01437","scoring_system":"epss","scoring_elements":"0.80707","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01437","scoring_system":"epss","scoring_elements":"0.80721","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01437","scoring_system":"epss","scoring_elements":"0.80704","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01437","scoring_system":"epss","scoring_elements":"0.80694","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01437","scoring_system":"epss","scoring_elements":"0.80666","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01437","scoring_system":"epss","scoring_elements":"0.80649","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01437","scoring_system":"epss","scoring_elements":"0.80671","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82224","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82145","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82169","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82165","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82182","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270666","reference_id":"2270666","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270666"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1685358%2C1861016%2C1880405%2C1881093","reference_id":"buglist.cgi?bug_id=1685358%2C1861016%2C1880405%2C1881093","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1685358%2C1861016%2C1880405%2C1881093"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-12/","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-12/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-13","reference_id":"mfsa2024-13","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-13"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-13/","reference_id":"mfsa2024-13","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-13/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-14","reference_id":"mfsa2024-14","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-14"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-14/","reference_id":"mfsa2024-14","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-14/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html","reference_id":"msg00028.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1483","reference_id":"RHSA-2024:1483","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1483"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1484","reference_id":"RHSA-2024:1484","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1484"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1485","reference_id":"RHSA-2024:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1486","reference_id":"RHSA-2024:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1487","reference_id":"RHSA-2024:1487","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1488","reference_id":"RHSA-2024:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1489","reference_id":"RHSA-2024:1489","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1490","reference_id":"RHSA-2024:1490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1491","reference_id":"RHSA-2024:1491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1492","reference_id":"RHSA-2024:1492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1493","reference_id":"RHSA-2024:1493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1494","reference_id":"RHSA-2024:1494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1495","reference_id":"RHSA-2024:1495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1496","reference_id":"RHSA-2024:1496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1497","reference_id":"RHSA-2024:1497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1498","reference_id":"RHSA-2024:1498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1499","reference_id":"RHSA-2024:1499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1500","reference_id":"RHSA-2024:1500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1500"},{"reference_url":"https://usn.ubuntu.com/6703-1/","reference_id":"USN-6703-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6703-1/"},{"reference_url":"https://usn.ubuntu.com/6717-1/","reference_id":"USN-6717-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6717-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584343?format=json","purl":"pkg:deb/debian/firefox@124.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1112518?format=json","purl":"pkg:deb/debian/firefox@150.0.3-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.3-1%3Fdistro=sid"}],"aliases":["CVE-2024-2614"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-41g2-dvb2-yqhg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62638?format=json","vulnerability_id":"VCID-4bfx-2qxt-jfha","summary":"Memory safety bugs present in Firefox 123. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2615","reference_id":"","reference_type":"","scores":[{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.42819","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.42844","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.42705","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.42781","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.42797","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.42725","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.42753","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.4301","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43037","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.42973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43023","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43036","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43058","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43024","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43007","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43066","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43054","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.42989","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.42925","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.42926","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2615"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1881074%2C1882438%2C1881650","reference_id":"buglist.cgi?bug_id=1881074%2C1882438%2C1881650","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:54:46Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1881074%2C1882438%2C1881650"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-12/","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:54:46Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-12/"},{"reference_url":"https://usn.ubuntu.com/6703-1/","reference_id":"USN-6703-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6703-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584343?format=json","purl":"pkg:deb/debian/firefox@124.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1112518?format=json","purl":"pkg:deb/debian/firefox@150.0.3-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.3-1%3Fdistro=sid"}],"aliases":["CVE-2024-2615"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4bfx-2qxt-jfha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62635?format=json","vulnerability_id":"VCID-b5y9-qmw5-nkbv","summary":"If an attacker could find a way to trigger a particular code path in SafeRefPtr, it could have triggered a crash or potentially be leveraged to achieve code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2612.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2612.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2612","reference_id":"","reference_type":"","scores":[{"value":"0.01138","scoring_system":"epss","scoring_elements":"0.78349","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01138","scoring_system":"epss","scoring_elements":"0.7838","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.8143","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.8141","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81402","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.8138","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81379","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81377","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81339","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81347","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81361","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81341","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81307","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81414","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01767","scoring_system":"epss","scoring_elements":"0.82826","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01767","scoring_system":"epss","scoring_elements":"0.82752","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01767","scoring_system":"epss","scoring_elements":"0.82773","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01767","scoring_system":"epss","scoring_elements":"0.82771","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01767","scoring_system":"epss","scoring_elements":"0.82786","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270665","reference_id":"2270665","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270665"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-12/","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-12/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-13","reference_id":"mfsa2024-13","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-13"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-13/","reference_id":"mfsa2024-13","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-13/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-14","reference_id":"mfsa2024-14","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-14"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-14/","reference_id":"mfsa2024-14","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-14/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html","reference_id":"msg00028.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1483","reference_id":"RHSA-2024:1483","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1483"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1484","reference_id":"RHSA-2024:1484","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1484"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1485","reference_id":"RHSA-2024:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1486","reference_id":"RHSA-2024:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1487","reference_id":"RHSA-2024:1487","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1488","reference_id":"RHSA-2024:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1489","reference_id":"RHSA-2024:1489","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1490","reference_id":"RHSA-2024:1490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1491","reference_id":"RHSA-2024:1491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1492","reference_id":"RHSA-2024:1492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1493","reference_id":"RHSA-2024:1493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1494","reference_id":"RHSA-2024:1494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1495","reference_id":"RHSA-2024:1495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1496","reference_id":"RHSA-2024:1496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1497","reference_id":"RHSA-2024:1497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1498","reference_id":"RHSA-2024:1498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1499","reference_id":"RHSA-2024:1499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1500","reference_id":"RHSA-2024:1500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1500"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1879444","reference_id":"show_bug.cgi?id=1879444","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1879444"},{"reference_url":"https://usn.ubuntu.com/6703-1/","reference_id":"USN-6703-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6703-1/"},{"reference_url":"https://usn.ubuntu.com/6717-1/","reference_id":"USN-6717-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6717-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584343?format=json","purl":"pkg:deb/debian/firefox@124.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1112518?format=json","purl":"pkg:deb/debian/firefox@150.0.3-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.3-1%3Fdistro=sid"}],"aliases":["CVE-2024-2612"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b5y9-qmw5-nkbv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62630?format=json","vulnerability_id":"VCID-fg7v-fypu-k3h4","summary":"Passing invalid data could have led to invalid wasm values being created, such as arbitrary integers turning into pointer values.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2606","reference_id":"","reference_type":"","scores":[{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35274","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35255","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35252","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35348","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35322","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35343","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35455","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.3537","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41864","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41838","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41766","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41693","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41814","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41776","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41826","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41836","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.4186","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41827","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2606"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-12/","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T14:50:19Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-12/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1879237","reference_id":"show_bug.cgi?id=1879237","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T14:50:19Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1879237"},{"reference_url":"https://usn.ubuntu.com/6703-1/","reference_id":"USN-6703-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6703-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584343?format=json","purl":"pkg:deb/debian/firefox@124.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1112518?format=json","purl":"pkg:deb/debian/firefox@150.0.3-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.3-1%3Fdistro=sid"}],"aliases":["CVE-2024-2606"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fg7v-fypu-k3h4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62632?format=json","vulnerability_id":"VCID-g24d-23zk-6fgn","summary":"AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding() and AppendEncodedCharacters() could have experienced integer overflows, causing underallocation of an output buffer leading to an out of bounds write.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2608.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2608.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2608","reference_id":"","reference_type":"","scores":[{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.3699","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36956","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40551","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40896","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40902","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40919","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40884","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40864","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40907","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40877","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40798","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40704","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40691","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40607","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40459","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40526","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40546","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40451","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40476","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40847","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270661","reference_id":"2270661","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270661"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-12/","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-12/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-13","reference_id":"mfsa2024-13","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-13"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-13/","reference_id":"mfsa2024-13","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-13/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-14","reference_id":"mfsa2024-14","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-14"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-14/","reference_id":"mfsa2024-14","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-14/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html","reference_id":"msg00028.html","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1483","reference_id":"RHSA-2024:1483","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1483"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1484","reference_id":"RHSA-2024:1484","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1484"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1485","reference_id":"RHSA-2024:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1486","reference_id":"RHSA-2024:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1487","reference_id":"RHSA-2024:1487","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1488","reference_id":"RHSA-2024:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1489","reference_id":"RHSA-2024:1489","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1490","reference_id":"RHSA-2024:1490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1491","reference_id":"RHSA-2024:1491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1492","reference_id":"RHSA-2024:1492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1493","reference_id":"RHSA-2024:1493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1494","reference_id":"RHSA-2024:1494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1495","reference_id":"RHSA-2024:1495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1496","reference_id":"RHSA-2024:1496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1497","reference_id":"RHSA-2024:1497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1498","reference_id":"RHSA-2024:1498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1499","reference_id":"RHSA-2024:1499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1500","reference_id":"RHSA-2024:1500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1500"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1880692","reference_id":"show_bug.cgi?id=1880692","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1880692"},{"reference_url":"https://usn.ubuntu.com/6703-1/","reference_id":"USN-6703-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6703-1/"},{"reference_url":"https://usn.ubuntu.com/6717-1/","reference_id":"USN-6717-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6717-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584343?format=json","purl":"pkg:deb/debian/firefox@124.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1112518?format=json","purl":"pkg:deb/debian/firefox@150.0.3-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.3-1%3Fdistro=sid"}],"aliases":["CVE-2024-2608"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g24d-23zk-6fgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62631?format=json","vulnerability_id":"VCID-n8gb-hpjb-v7a5","summary":"Return registers were overwritten which could have allowed an attacker to execute arbitrary code. *Note:* This issue only affected Armv7-A systems. Other operating systems are unaffected.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2607.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2607.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2607","reference_id":"","reference_type":"","scores":[{"value":"0.01453","scoring_system":"epss","scoring_elements":"0.80992","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01453","scoring_system":"epss","scoring_elements":"0.80792","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01453","scoring_system":"epss","scoring_elements":"0.80801","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01453","scoring_system":"epss","scoring_elements":"0.80817","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01453","scoring_system":"epss","scoring_elements":"0.80803","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01453","scoring_system":"epss","scoring_elements":"0.80795","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01453","scoring_system":"epss","scoring_elements":"0.80832","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01453","scoring_system":"epss","scoring_elements":"0.80834","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01453","scoring_system":"epss","scoring_elements":"0.80835","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01453","scoring_system":"epss","scoring_elements":"0.80858","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01453","scoring_system":"epss","scoring_elements":"0.80863","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01453","scoring_system":"epss","scoring_elements":"0.80875","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01453","scoring_system":"epss","scoring_elements":"0.80892","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01453","scoring_system":"epss","scoring_elements":"0.80913","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01453","scoring_system":"epss","scoring_elements":"0.80935","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01453","scoring_system":"epss","scoring_elements":"0.8093","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01453","scoring_system":"epss","scoring_elements":"0.80948","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01453","scoring_system":"epss","scoring_elements":"0.80746","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01453","scoring_system":"epss","scoring_elements":"0.80766","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01453","scoring_system":"epss","scoring_elements":"0.80764","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270660","reference_id":"2270660","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270660"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-12/","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-12/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-13","reference_id":"mfsa2024-13","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-13"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-13/","reference_id":"mfsa2024-13","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-13/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-14","reference_id":"mfsa2024-14","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-14"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-14/","reference_id":"mfsa2024-14","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-14/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html","reference_id":"msg00028.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1483","reference_id":"RHSA-2024:1483","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1483"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1484","reference_id":"RHSA-2024:1484","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1484"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1485","reference_id":"RHSA-2024:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1486","reference_id":"RHSA-2024:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1487","reference_id":"RHSA-2024:1487","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1488","reference_id":"RHSA-2024:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1489","reference_id":"RHSA-2024:1489","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1490","reference_id":"RHSA-2024:1490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1491","reference_id":"RHSA-2024:1491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1492","reference_id":"RHSA-2024:1492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1493","reference_id":"RHSA-2024:1493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1494","reference_id":"RHSA-2024:1494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1495","reference_id":"RHSA-2024:1495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1496","reference_id":"RHSA-2024:1496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1497","reference_id":"RHSA-2024:1497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1498","reference_id":"RHSA-2024:1498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1499","reference_id":"RHSA-2024:1499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1500","reference_id":"RHSA-2024:1500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1500"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1879939","reference_id":"show_bug.cgi?id=1879939","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1879939"},{"reference_url":"https://usn.ubuntu.com/6703-1/","reference_id":"USN-6703-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6703-1/"},{"reference_url":"https://usn.ubuntu.com/6717-1/","reference_id":"USN-6717-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6717-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584343?format=json","purl":"pkg:deb/debian/firefox@124.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1112518?format=json","purl":"pkg:deb/debian/firefox@150.0.3-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.3-1%3Fdistro=sid"}],"aliases":["CVE-2024-2607"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n8gb-hpjb-v7a5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62633?format=json","vulnerability_id":"VCID-pse8-xnc7-gkbv","summary":"Using a markup injection an attacker could have stolen nonce values. This could have been used to bypass strict content security policies.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2610.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2610.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2610","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39199","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39221","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46879","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.47006","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.47069","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.47074","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.47018","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.47011","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.47038","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.47013","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.47016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46961","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46966","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52589","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52477","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52523","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52486","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.5251","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2610"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270663","reference_id":"2270663","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270663"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-12/","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-12/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-13","reference_id":"mfsa2024-13","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-13"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-13/","reference_id":"mfsa2024-13","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-13/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-14","reference_id":"mfsa2024-14","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-14"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-14/","reference_id":"mfsa2024-14","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-14/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html","reference_id":"msg00028.html","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1483","reference_id":"RHSA-2024:1483","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1483"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1484","reference_id":"RHSA-2024:1484","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1484"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1485","reference_id":"RHSA-2024:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1486","reference_id":"RHSA-2024:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1487","reference_id":"RHSA-2024:1487","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1488","reference_id":"RHSA-2024:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1489","reference_id":"RHSA-2024:1489","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1490","reference_id":"RHSA-2024:1490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1491","reference_id":"RHSA-2024:1491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1492","reference_id":"RHSA-2024:1492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1493","reference_id":"RHSA-2024:1493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1494","reference_id":"RHSA-2024:1494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1495","reference_id":"RHSA-2024:1495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1496","reference_id":"RHSA-2024:1496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1497","reference_id":"RHSA-2024:1497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1498","reference_id":"RHSA-2024:1498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1499","reference_id":"RHSA-2024:1499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1500","reference_id":"RHSA-2024:1500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1500"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1871112","reference_id":"show_bug.cgi?id=1871112","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1871112"},{"reference_url":"https://usn.ubuntu.com/6703-1/","reference_id":"USN-6703-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6703-1/"},{"reference_url":"https://usn.ubuntu.com/6717-1/","reference_id":"USN-6717-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6717-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584343?format=json","purl":"pkg:deb/debian/firefox@124.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1112518?format=json","purl":"pkg:deb/debian/firefox@150.0.3-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.3-1%3Fdistro=sid"}],"aliases":["CVE-2024-2610"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pse8-xnc7-gkbv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62636?format=json","vulnerability_id":"VCID-v5gq-2gv5-gycv","summary":"Data was not properly sanitized when decoding a QUIC ACK frame; this could have led to unrestricted memory consumption and a crash.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2613","reference_id":"","reference_type":"","scores":[{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.31975","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32042","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.319","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.31968","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.31976","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.31882","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.31906","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32556","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32593","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32416","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32464","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32495","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32456","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.3243","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32465","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32444","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32414","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32243","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32126","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2613"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-12/","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-02T19:42:05Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-12/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1875701","reference_id":"show_bug.cgi?id=1875701","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-02T19:42:05Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1875701"},{"reference_url":"https://usn.ubuntu.com/6703-1/","reference_id":"USN-6703-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6703-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584343?format=json","purl":"pkg:deb/debian/firefox@124.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1112518?format=json","purl":"pkg:deb/debian/firefox@150.0.3-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.3-1%3Fdistro=sid"}],"aliases":["CVE-2024-2613"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v5gq-2gv5-gycv"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@124.0-1%3Fdistro=sid"}