{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","type":"ebuild","namespace":"www-client","name":"firefox","version":"134.0","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"137.0.1","latest_non_vulnerable_version":"137.0.1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36153?format=json","vulnerability_id":"VCID-19vv-zhum-43hp","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10468.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10468.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10468","reference_id":"","reference_type":"","scores":[{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50394","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50577","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50553","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50539","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50581","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50586","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50563","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50509","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50517","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50472","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50503","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.5053","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50484","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50538","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50535","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10468"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322443","reference_id":"2322443","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322443"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-08","reference_id":"GLSA-202505-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-55","reference_id":"mfsa2024-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-55"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-55/","reference_id":"mfsa2024-55","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:16:38Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-55/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-59","reference_id":"mfsa2024-59","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-59"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-59/","reference_id":"mfsa2024-59","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:16:38Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-59/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1914982","reference_id":"show_bug.cgi?id=1914982","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:16:38Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1914982"},{"reference_url":"https://usn.ubuntu.com/7086-1/","reference_id":"USN-7086-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7086-1/"},{"reference_url":"https://usn.ubuntu.com/7991-1/","reference_id":"USN-7991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-10468"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-19vv-zhum-43hp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41995?format=json","vulnerability_id":"VCID-1zf8-qjts-9fbc","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11704.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11704.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11704","reference_id":"","reference_type":"","scores":[{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42037","published_at":"2026-04-07T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42112","published_at":"2026-04-16T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42061","published_at":"2026-04-13T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42086","published_at":"2026-04-12T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42124","published_at":"2026-04-11T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42101","published_at":"2026-04-09T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42089","published_at":"2026-04-08T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42072","published_at":"2026-04-02T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42099","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50639","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50574","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50447","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50566","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50617","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50528","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11704"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328942","reference_id":"2328942","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328942"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-03","reference_id":"GLSA-202505-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-03"},{"reference_url":"https://security.gentoo.org/glsa/202509-02","reference_id":"GLSA-202509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-63/","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:21:47Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-63/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-67/","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:21:47Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-67/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-09","reference_id":"mfsa2025-09","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-09"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-09/","reference_id":"mfsa2025-09","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:21:47Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-09/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-10","reference_id":"mfsa2025-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-10"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-10/","reference_id":"mfsa2025-10","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:21:47Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-10/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1899402","reference_id":"show_bug.cgi?id=1899402","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:21:47Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1899402"},{"reference_url":"https://usn.ubuntu.com/7134-1/","reference_id":"USN-7134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7134-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-11704"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1zf8-qjts-9fbc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41997?format=json","vulnerability_id":"VCID-3fpq-jre6-53fs","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11706.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11706.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11706","reference_id":"","reference_type":"","scores":[{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37858","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38353","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38316","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38291","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38339","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38317","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38253","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38094","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38071","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37977","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38389","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38413","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38277","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38327","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38336","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11706"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328951","reference_id":"2328951","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328951"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-03","reference_id":"GLSA-202505-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-03"},{"reference_url":"https://security.gentoo.org/glsa/202509-02","reference_id":"GLSA-202509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-63/","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-26T16:29:42Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-63/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-67/","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-26T16:29:42Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-67/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1923767","reference_id":"show_bug.cgi?id=1923767","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-26T16:29:42Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1923767"},{"reference_url":"https://usn.ubuntu.com/7134-1/","reference_id":"USN-7134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7134-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-11706"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3fpq-jre6-53fs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42004?format=json","vulnerability_id":"VCID-4zjw-4gjw-pqh1","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0242.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0242.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0242","reference_id":"","reference_type":"","scores":[{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85172","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85129","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85152","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85158","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02914","scoring_system":"epss","scoring_elements":"0.86362","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02914","scoring_system":"epss","scoring_elements":"0.86324","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02914","scoring_system":"epss","scoring_elements":"0.86394","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02914","scoring_system":"epss","scoring_elements":"0.86377","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02914","scoring_system":"epss","scoring_elements":"0.86383","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02914","scoring_system":"epss","scoring_elements":"0.86385","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02914","scoring_system":"epss","scoring_elements":"0.86342","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02914","scoring_system":"epss","scoring_elements":"0.86343","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02914","scoring_system":"epss","scoring_elements":"0.86371","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02914","scoring_system":"epss","scoring_elements":"0.86399","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0242"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0242"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336181","reference_id":"2336181","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336181"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1874523%2C1926454%2C1931873%2C1932169","reference_id":"buglist.cgi?bug_id=1874523%2C1926454%2C1931873%2C1932169","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T16:40:52Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1874523%2C1926454%2C1931873%2C1932169"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-03","reference_id":"GLSA-202505-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-03"},{"reference_url":"https://security.gentoo.org/glsa/202509-02","reference_id":"GLSA-202509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-01","reference_id":"mfsa2025-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-01"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-01/","reference_id":"mfsa2025-01","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T16:40:52Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-01/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-02","reference_id":"mfsa2025-02","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-02"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-02/","reference_id":"mfsa2025-02","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T16:40:52Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-02/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-03","reference_id":"mfsa2025-03","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-03"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-03/","reference_id":"mfsa2025-03","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T16:40:52Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-03/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-04","reference_id":"mfsa2025-04","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-04"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-04/","reference_id":"mfsa2025-04","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T16:40:52Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-04/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-05","reference_id":"mfsa2025-05","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-05"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-05/","reference_id":"mfsa2025-05","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T16:40:52Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-05/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0080","reference_id":"RHSA-2025:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0132","reference_id":"RHSA-2025:0132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0133","reference_id":"RHSA-2025:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0133"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0134","reference_id":"RHSA-2025:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0135","reference_id":"RHSA-2025:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0136","reference_id":"RHSA-2025:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0137","reference_id":"RHSA-2025:0137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0138","reference_id":"RHSA-2025:0138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0144","reference_id":"RHSA-2025:0144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0147","reference_id":"RHSA-2025:0147","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0147"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0162","reference_id":"RHSA-2025:0162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0165","reference_id":"RHSA-2025:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0166","reference_id":"RHSA-2025:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0167","reference_id":"RHSA-2025:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0275","reference_id":"RHSA-2025:0275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0275"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0281","reference_id":"RHSA-2025:0281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0284","reference_id":"RHSA-2025:0284","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0284"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0286","reference_id":"RHSA-2025:0286","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0286"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0287","reference_id":"RHSA-2025:0287","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0287"},{"reference_url":"https://usn.ubuntu.com/7191-1/","reference_id":"USN-7191-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7191-1/"},{"reference_url":"https://usn.ubuntu.com/7663-1/","reference_id":"USN-7663-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7663-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2025-0242"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4zjw-4gjw-pqh1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41987?format=json","vulnerability_id":"VCID-5j6z-g7gt-qyea","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11694.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11694.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11694","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32759","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32653","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32663","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32625","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32664","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32689","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32691","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32616","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32795","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.3732","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36862","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36981","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37069","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37099","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39421","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11694"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11694","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11694"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328941","reference_id":"2328941","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328941"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-03","reference_id":"GLSA-202505-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-03"},{"reference_url":"https://security.gentoo.org/glsa/202509-02","reference_id":"GLSA-202509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-63/","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-63/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-64","reference_id":"mfsa2024-64","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-64"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-64/","reference_id":"mfsa2024-64","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-64/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-65","reference_id":"mfsa2024-65","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-65"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-65/","reference_id":"mfsa2024-65","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-65/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-67/","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-67/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-68","reference_id":"mfsa2024-68","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-68"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-68/","reference_id":"mfsa2024-68","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-68/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-70","reference_id":"mfsa2024-70","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-70"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-70/","reference_id":"mfsa2024-70","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-70/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10591","reference_id":"RHSA-2024:10591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10592","reference_id":"RHSA-2024:10592","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10667","reference_id":"RHSA-2024:10667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10702","reference_id":"RHSA-2024:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10703","reference_id":"RHSA-2024:10703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10704","reference_id":"RHSA-2024:10704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10710","reference_id":"RHSA-2024:10710","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10710"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10733","reference_id":"RHSA-2024:10733","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10733"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10734","reference_id":"RHSA-2024:10734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10742","reference_id":"RHSA-2024:10742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10743","reference_id":"RHSA-2024:10743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10745","reference_id":"RHSA-2024:10745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10748","reference_id":"RHSA-2024:10748","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10748"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10752","reference_id":"RHSA-2024:10752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10844","reference_id":"RHSA-2024:10844","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10844"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10848","reference_id":"RHSA-2024:10848","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10848"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10849","reference_id":"RHSA-2024:10849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10849"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10880","reference_id":"RHSA-2024:10880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10881","reference_id":"RHSA-2024:10881","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10881"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1924167","reference_id":"show_bug.cgi?id=1924167","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1924167"},{"reference_url":"https://usn.ubuntu.com/7134-1/","reference_id":"USN-7134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7134-1/"},{"reference_url":"https://usn.ubuntu.com/7193-1/","reference_id":"USN-7193-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7193-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-11694"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5j6z-g7gt-qyea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36147?format=json","vulnerability_id":"VCID-6bbw-b3rx-a7hj","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10462.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10462.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10462","reference_id":"","reference_type":"","scores":[{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66073","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66096","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66097","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66086","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66065","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66077","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66063","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.6599","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.65994","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66023","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66028","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66058","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66071","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66052","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.6604","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10462"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322440","reference_id":"2322440","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322440"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-08","reference_id":"GLSA-202505-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-55","reference_id":"mfsa2024-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-55"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-55/","reference_id":"mfsa2024-55","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T15:00:03Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-55/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-56","reference_id":"mfsa2024-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-56"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-56/","reference_id":"mfsa2024-56","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T15:00:03Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-56/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-58","reference_id":"mfsa2024-58","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-58"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-58/","reference_id":"mfsa2024-58","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T15:00:03Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-58/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-59","reference_id":"mfsa2024-59","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-59"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-59/","reference_id":"mfsa2024-59","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T15:00:03Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-59/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8720","reference_id":"RHSA-2024:8720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8721","reference_id":"RHSA-2024:8721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8722","reference_id":"RHSA-2024:8722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8723","reference_id":"RHSA-2024:8723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8724","reference_id":"RHSA-2024:8724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8725","reference_id":"RHSA-2024:8725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8726","reference_id":"RHSA-2024:8726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8727","reference_id":"RHSA-2024:8727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8728","reference_id":"RHSA-2024:8728","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8728"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8729","reference_id":"RHSA-2024:8729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8790","reference_id":"RHSA-2024:8790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8793","reference_id":"RHSA-2024:8793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8793"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9015","reference_id":"RHSA-2024:9015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9016","reference_id":"RHSA-2024:9016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9017","reference_id":"RHSA-2024:9017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9018","reference_id":"RHSA-2024:9018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9019","reference_id":"RHSA-2024:9019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9552","reference_id":"RHSA-2024:9552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9554","reference_id":"RHSA-2024:9554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9554"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1920423","reference_id":"show_bug.cgi?id=1920423","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T15:00:03Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1920423"},{"reference_url":"https://usn.ubuntu.com/7086-1/","reference_id":"USN-7086-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7086-1/"},{"reference_url":"https://usn.ubuntu.com/7991-1/","reference_id":"USN-7991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-10462"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6bbw-b3rx-a7hj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41998?format=json","vulnerability_id":"VCID-73bd-e4pc-y7h6","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11708.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11708.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11708","reference_id":"","reference_type":"","scores":[{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.38994","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39533","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39495","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39478","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39528","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.395","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39416","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.3922","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39203","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39121","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39514","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39537","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39451","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39507","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39522","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11708"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328939","reference_id":"2328939","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328939"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-03","reference_id":"GLSA-202505-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-03"},{"reference_url":"https://security.gentoo.org/glsa/202509-02","reference_id":"GLSA-202509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-63/","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:06:43Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-63/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-67/","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:06:43Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-67/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1922912","reference_id":"show_bug.cgi?id=1922912","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:06:43Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1922912"},{"reference_url":"https://usn.ubuntu.com/7134-1/","reference_id":"USN-7134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7134-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-11708"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-73bd-e4pc-y7h6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41996?format=json","vulnerability_id":"VCID-769r-8mmt-6qcc","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11705.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11705.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11705","reference_id":"","reference_type":"","scores":[{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40763","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40718","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40737","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40752","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40745","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40695","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40771","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48906","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.4907","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49038","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49023","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49032","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48988","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11705"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328955","reference_id":"2328955","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328955"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-03","reference_id":"GLSA-202505-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-03"},{"reference_url":"https://security.gentoo.org/glsa/202509-02","reference_id":"GLSA-202509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-63/","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:11:54Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-63/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-67/","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:11:54Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-67/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1921768","reference_id":"show_bug.cgi?id=1921768","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:11:54Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1921768"},{"reference_url":"https://usn.ubuntu.com/7134-1/","reference_id":"USN-7134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7134-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-11705"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-769r-8mmt-6qcc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41991?format=json","vulnerability_id":"VCID-8k4z-rq29-mqg5","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11697.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11697.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11697","reference_id":"","reference_type":"","scores":[{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21968","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22018","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.2202","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22081","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22122","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22104","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22048","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22135","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22184","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25411","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25459","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25295","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25467","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25514","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26995","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11697"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11697","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11697"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328950","reference_id":"2328950","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328950"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-03","reference_id":"GLSA-202505-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-03"},{"reference_url":"https://security.gentoo.org/glsa/202509-02","reference_id":"GLSA-202509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-63/","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:26:51Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-63/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-64","reference_id":"mfsa2024-64","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-64"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-64/","reference_id":"mfsa2024-64","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:26:51Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-64/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-67/","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:26:51Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-67/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-68","reference_id":"mfsa2024-68","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-68"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-68/","reference_id":"mfsa2024-68","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:26:51Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-68/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10591","reference_id":"RHSA-2024:10591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10592","reference_id":"RHSA-2024:10592","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10667","reference_id":"RHSA-2024:10667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10702","reference_id":"RHSA-2024:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10703","reference_id":"RHSA-2024:10703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10704","reference_id":"RHSA-2024:10704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10710","reference_id":"RHSA-2024:10710","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10710"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10733","reference_id":"RHSA-2024:10733","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10733"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10734","reference_id":"RHSA-2024:10734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10742","reference_id":"RHSA-2024:10742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10743","reference_id":"RHSA-2024:10743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10745","reference_id":"RHSA-2024:10745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10748","reference_id":"RHSA-2024:10748","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10748"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10752","reference_id":"RHSA-2024:10752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10844","reference_id":"RHSA-2024:10844","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10844"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10848","reference_id":"RHSA-2024:10848","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10848"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10849","reference_id":"RHSA-2024:10849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10849"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10880","reference_id":"RHSA-2024:10880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10881","reference_id":"RHSA-2024:10881","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10881"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1842187","reference_id":"show_bug.cgi?id=1842187","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:26:51Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1842187"},{"reference_url":"https://usn.ubuntu.com/7134-1/","reference_id":"USN-7134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7134-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-11697"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8k4z-rq29-mqg5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36145?format=json","vulnerability_id":"VCID-aemu-emvp-hkfh","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10460.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10460.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10460","reference_id":"","reference_type":"","scores":[{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.6187","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61925","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61933","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61862","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61832","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61834","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61915","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61919","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61936","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61931","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61908","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.6192","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61899","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61883","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10460"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322444","reference_id":"2322444","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322444"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-08","reference_id":"GLSA-202505-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-55","reference_id":"mfsa2024-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-55"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-55/","reference_id":"mfsa2024-55","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:40:17Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-55/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-56","reference_id":"mfsa2024-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-56"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-56/","reference_id":"mfsa2024-56","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:40:17Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-56/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-58","reference_id":"mfsa2024-58","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-58"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-58/","reference_id":"mfsa2024-58","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:40:17Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-58/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-59","reference_id":"mfsa2024-59","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-59"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-59/","reference_id":"mfsa2024-59","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:40:17Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-59/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8720","reference_id":"RHSA-2024:8720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8721","reference_id":"RHSA-2024:8721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8722","reference_id":"RHSA-2024:8722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8723","reference_id":"RHSA-2024:8723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8724","reference_id":"RHSA-2024:8724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8725","reference_id":"RHSA-2024:8725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8726","reference_id":"RHSA-2024:8726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8727","reference_id":"RHSA-2024:8727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8728","reference_id":"RHSA-2024:8728","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8728"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8729","reference_id":"RHSA-2024:8729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8790","reference_id":"RHSA-2024:8790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8793","reference_id":"RHSA-2024:8793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8793"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9015","reference_id":"RHSA-2024:9015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9016","reference_id":"RHSA-2024:9016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9017","reference_id":"RHSA-2024:9017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9018","reference_id":"RHSA-2024:9018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9019","reference_id":"RHSA-2024:9019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9552","reference_id":"RHSA-2024:9552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9554","reference_id":"RHSA-2024:9554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9554"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1912537","reference_id":"show_bug.cgi?id=1912537","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:40:17Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1912537"},{"reference_url":"https://usn.ubuntu.com/7086-1/","reference_id":"USN-7086-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7086-1/"},{"reference_url":"https://usn.ubuntu.com/7991-1/","reference_id":"USN-7991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-10460"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aemu-emvp-hkfh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41988?format=json","vulnerability_id":"VCID-bjny-apx2-8ba1","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11695.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11695.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11695","reference_id":"","reference_type":"","scores":[{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.3245","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32501","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32466","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32492","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.3253","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32526","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32498","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32591","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32627","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.3693","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36898","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36693","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.3681","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37155","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39232","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11695"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328948","reference_id":"2328948","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328948"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-03","reference_id":"GLSA-202505-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-03"},{"reference_url":"https://security.gentoo.org/glsa/202509-02","reference_id":"GLSA-202509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-63/","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:43:59Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-63/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-64","reference_id":"mfsa2024-64","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-64"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-64/","reference_id":"mfsa2024-64","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:43:59Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-64/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-67/","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:43:59Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-67/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-68","reference_id":"mfsa2024-68","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-68"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-68/","reference_id":"mfsa2024-68","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:43:59Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-68/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10591","reference_id":"RHSA-2024:10591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10592","reference_id":"RHSA-2024:10592","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10667","reference_id":"RHSA-2024:10667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10702","reference_id":"RHSA-2024:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10703","reference_id":"RHSA-2024:10703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10704","reference_id":"RHSA-2024:10704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10710","reference_id":"RHSA-2024:10710","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10710"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10733","reference_id":"RHSA-2024:10733","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10733"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10734","reference_id":"RHSA-2024:10734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10742","reference_id":"RHSA-2024:10742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10743","reference_id":"RHSA-2024:10743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10745","reference_id":"RHSA-2024:10745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10748","reference_id":"RHSA-2024:10748","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10748"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10752","reference_id":"RHSA-2024:10752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10844","reference_id":"RHSA-2024:10844","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10844"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10848","reference_id":"RHSA-2024:10848","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10848"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10849","reference_id":"RHSA-2024:10849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10849"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10880","reference_id":"RHSA-2024:10880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10881","reference_id":"RHSA-2024:10881","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10881"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1925496","reference_id":"show_bug.cgi?id=1925496","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:43:59Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1925496"},{"reference_url":"https://usn.ubuntu.com/7134-1/","reference_id":"USN-7134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7134-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-11695"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bjny-apx2-8ba1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36144?format=json","vulnerability_id":"VCID-bwk4-hqx8-97dy","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10459.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10459.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10459","reference_id":"","reference_type":"","scores":[{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72318","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72327","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72331","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72321","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.722","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72232","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72195","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.7222","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72276","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72289","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.7228","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72237","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72251","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72267","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72244","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10459"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10459","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10459"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322429","reference_id":"2322429","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322429"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-08","reference_id":"GLSA-202505-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-55","reference_id":"mfsa2024-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-55"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-55/","reference_id":"mfsa2024-55","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-55/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-56","reference_id":"mfsa2024-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-56"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-56/","reference_id":"mfsa2024-56","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-56/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-57","reference_id":"mfsa2024-57","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-57"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-57/","reference_id":"mfsa2024-57","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-57/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-58","reference_id":"mfsa2024-58","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-58"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-58/","reference_id":"mfsa2024-58","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-58/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-59","reference_id":"mfsa2024-59","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-59"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-59/","reference_id":"mfsa2024-59","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-59/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8720","reference_id":"RHSA-2024:8720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8721","reference_id":"RHSA-2024:8721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8722","reference_id":"RHSA-2024:8722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8723","reference_id":"RHSA-2024:8723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8724","reference_id":"RHSA-2024:8724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8725","reference_id":"RHSA-2024:8725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8726","reference_id":"RHSA-2024:8726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8727","reference_id":"RHSA-2024:8727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8728","reference_id":"RHSA-2024:8728","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8728"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8729","reference_id":"RHSA-2024:8729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8790","reference_id":"RHSA-2024:8790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8793","reference_id":"RHSA-2024:8793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8793"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9015","reference_id":"RHSA-2024:9015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9016","reference_id":"RHSA-2024:9016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9017","reference_id":"RHSA-2024:9017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9018","reference_id":"RHSA-2024:9018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9019","reference_id":"RHSA-2024:9019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9552","reference_id":"RHSA-2024:9552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9554","reference_id":"RHSA-2024:9554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9554"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1919087","reference_id":"show_bug.cgi?id=1919087","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1919087"},{"reference_url":"https://usn.ubuntu.com/7086-1/","reference_id":"USN-7086-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7086-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-10459"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bwk4-hqx8-97dy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42006?format=json","vulnerability_id":"VCID-dgxf-c2sb-5qds","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0247.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0247.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0247","reference_id":"","reference_type":"","scores":[{"value":"0.15058","scoring_system":"epss","scoring_elements":"0.94593","published_at":"2026-04-18T12:55:00Z"},{"value":"0.15058","scoring_system":"epss","scoring_elements":"0.94589","published_at":"2026-04-16T12:55:00Z"},{"value":"0.15058","scoring_system":"epss","scoring_elements":"0.94545","published_at":"2026-04-02T12:55:00Z"},{"value":"0.15058","scoring_system":"epss","scoring_elements":"0.94576","published_at":"2026-04-13T12:55:00Z"},{"value":"0.15058","scoring_system":"epss","scoring_elements":"0.94575","published_at":"2026-04-12T12:55:00Z"},{"value":"0.15058","scoring_system":"epss","scoring_elements":"0.94573","published_at":"2026-04-11T12:55:00Z"},{"value":"0.15058","scoring_system":"epss","scoring_elements":"0.94569","published_at":"2026-04-09T12:55:00Z"},{"value":"0.15058","scoring_system":"epss","scoring_elements":"0.94565","published_at":"2026-04-08T12:55:00Z"},{"value":"0.15058","scoring_system":"epss","scoring_elements":"0.94553","published_at":"2026-04-04T12:55:00Z"},{"value":"0.15058","scoring_system":"epss","scoring_elements":"0.94555","published_at":"2026-04-07T12:55:00Z"},{"value":"0.15399","scoring_system":"epss","scoring_elements":"0.94674","published_at":"2026-05-05T12:55:00Z"},{"value":"0.15399","scoring_system":"epss","scoring_elements":"0.94665","published_at":"2026-04-24T12:55:00Z"},{"value":"0.15399","scoring_system":"epss","scoring_elements":"0.94666","published_at":"2026-04-26T12:55:00Z"},{"value":"0.15399","scoring_system":"epss","scoring_elements":"0.94667","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0247"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336176","reference_id":"2336176","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336176"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1835193%2C1910021%2C1919803%2C1931576%2C1931948%2C1932173","reference_id":"buglist.cgi?bug_id=1835193%2C1910021%2C1919803%2C1931576%2C1931948%2C1932173","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T14:52:46Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1835193%2C1910021%2C1919803%2C1931576%2C1931948%2C1932173"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-01","reference_id":"mfsa2025-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-01"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-01/","reference_id":"mfsa2025-01","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T14:52:46Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-01/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-04","reference_id":"mfsa2025-04","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-04"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-04/","reference_id":"mfsa2025-04","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T14:52:46Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-04/"},{"reference_url":"https://usn.ubuntu.com/7191-1/","reference_id":"USN-7191-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7191-1/"},{"reference_url":"https://usn.ubuntu.com/7991-1/","reference_id":"USN-7991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2025-0247"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dgxf-c2sb-5qds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41989?format=json","vulnerability_id":"VCID-dh5k-q87q-4qfs","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11696.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11696.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11696","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13698","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13625","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13713","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13762","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13799","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13831","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1378","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13839","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13896","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17368","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17437","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1723","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17459","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17549","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18978","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11696"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328943","reference_id":"2328943","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328943"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-03","reference_id":"GLSA-202505-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-03"},{"reference_url":"https://security.gentoo.org/glsa/202509-02","reference_id":"GLSA-202509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-63/","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:02:13Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-63/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-64","reference_id":"mfsa2024-64","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-64"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-64/","reference_id":"mfsa2024-64","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:02:13Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-64/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-67/","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:02:13Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-67/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-68","reference_id":"mfsa2024-68","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-68"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-68/","reference_id":"mfsa2024-68","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:02:13Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-68/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10591","reference_id":"RHSA-2024:10591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10592","reference_id":"RHSA-2024:10592","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10667","reference_id":"RHSA-2024:10667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10702","reference_id":"RHSA-2024:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10703","reference_id":"RHSA-2024:10703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10704","reference_id":"RHSA-2024:10704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10710","reference_id":"RHSA-2024:10710","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10710"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10733","reference_id":"RHSA-2024:10733","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10733"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10734","reference_id":"RHSA-2024:10734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10742","reference_id":"RHSA-2024:10742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10743","reference_id":"RHSA-2024:10743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10745","reference_id":"RHSA-2024:10745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10748","reference_id":"RHSA-2024:10748","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10748"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10752","reference_id":"RHSA-2024:10752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10844","reference_id":"RHSA-2024:10844","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10844"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10848","reference_id":"RHSA-2024:10848","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10848"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10849","reference_id":"RHSA-2024:10849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10849"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10880","reference_id":"RHSA-2024:10880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10881","reference_id":"RHSA-2024:10881","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10881"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1929600","reference_id":"show_bug.cgi?id=1929600","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:02:13Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1929600"},{"reference_url":"https://usn.ubuntu.com/7134-1/","reference_id":"USN-7134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7134-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-11696"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dh5k-q87q-4qfs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36149?format=json","vulnerability_id":"VCID-ds2y-kn7q-vuct","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10464.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10464.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10464","reference_id":"","reference_type":"","scores":[{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.6695","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66978","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.6698","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66945","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66963","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66949","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66879","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.6688","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66906","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66916","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66947","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66961","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66941","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66927","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10464"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322424","reference_id":"2322424","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322424"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-08","reference_id":"GLSA-202505-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-55","reference_id":"mfsa2024-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-55"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-55/","reference_id":"mfsa2024-55","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:48:10Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-55/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-56","reference_id":"mfsa2024-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-56"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-56/","reference_id":"mfsa2024-56","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:48:10Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-56/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-58","reference_id":"mfsa2024-58","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-58"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-58/","reference_id":"mfsa2024-58","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:48:10Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-58/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-59","reference_id":"mfsa2024-59","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-59"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-59/","reference_id":"mfsa2024-59","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:48:10Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-59/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8720","reference_id":"RHSA-2024:8720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8721","reference_id":"RHSA-2024:8721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8722","reference_id":"RHSA-2024:8722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8723","reference_id":"RHSA-2024:8723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8724","reference_id":"RHSA-2024:8724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8725","reference_id":"RHSA-2024:8725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8726","reference_id":"RHSA-2024:8726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8727","reference_id":"RHSA-2024:8727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8728","reference_id":"RHSA-2024:8728","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8728"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8729","reference_id":"RHSA-2024:8729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8790","reference_id":"RHSA-2024:8790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8793","reference_id":"RHSA-2024:8793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8793"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9015","reference_id":"RHSA-2024:9015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9016","reference_id":"RHSA-2024:9016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9017","reference_id":"RHSA-2024:9017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9018","reference_id":"RHSA-2024:9018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9019","reference_id":"RHSA-2024:9019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9552","reference_id":"RHSA-2024:9552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9554","reference_id":"RHSA-2024:9554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9554"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1913000","reference_id":"show_bug.cgi?id=1913000","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:48:10Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1913000"},{"reference_url":"https://usn.ubuntu.com/7086-1/","reference_id":"USN-7086-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7086-1/"},{"reference_url":"https://usn.ubuntu.com/7991-1/","reference_id":"USN-7991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-10464"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ds2y-kn7q-vuct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42001?format=json","vulnerability_id":"VCID-f1zm-g4es-vfbz","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0239.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0239.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0239","reference_id":"","reference_type":"","scores":[{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08694","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08546","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08658","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08677","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08596","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0867","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08626","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08593","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08656","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08654","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08702","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08687","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08534","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0239"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0239","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0239"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336170","reference_id":"2336170","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336170"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-03","reference_id":"GLSA-202505-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-03"},{"reference_url":"https://security.gentoo.org/glsa/202509-02","reference_id":"GLSA-202509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-01","reference_id":"mfsa2025-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-01"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-01/","reference_id":"mfsa2025-01","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:33:42Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-01/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-02","reference_id":"mfsa2025-02","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-02"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-02/","reference_id":"mfsa2025-02","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:33:42Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-02/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-04","reference_id":"mfsa2025-04","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-04"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-04/","reference_id":"mfsa2025-04","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:33:42Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-04/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-05","reference_id":"mfsa2025-05","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-05"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-05/","reference_id":"mfsa2025-05","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:33:42Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-05/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0080","reference_id":"RHSA-2025:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0132","reference_id":"RHSA-2025:0132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0133","reference_id":"RHSA-2025:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0133"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0134","reference_id":"RHSA-2025:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0135","reference_id":"RHSA-2025:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0136","reference_id":"RHSA-2025:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0137","reference_id":"RHSA-2025:0137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0138","reference_id":"RHSA-2025:0138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0144","reference_id":"RHSA-2025:0144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0147","reference_id":"RHSA-2025:0147","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0147"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0162","reference_id":"RHSA-2025:0162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0165","reference_id":"RHSA-2025:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0166","reference_id":"RHSA-2025:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0167","reference_id":"RHSA-2025:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0275","reference_id":"RHSA-2025:0275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0275"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0281","reference_id":"RHSA-2025:0281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0284","reference_id":"RHSA-2025:0284","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0284"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0286","reference_id":"RHSA-2025:0286","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0286"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0287","reference_id":"RHSA-2025:0287","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0287"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1929156","reference_id":"show_bug.cgi?id=1929156","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:33:42Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1929156"},{"reference_url":"https://usn.ubuntu.com/7191-1/","reference_id":"USN-7191-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7191-1/"},{"reference_url":"https://usn.ubuntu.com/7991-1/","reference_id":"USN-7991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2025-0239"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f1zm-g4es-vfbz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41986?format=json","vulnerability_id":"VCID-grjt-j4at-pqbp","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11692.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11692.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11692","reference_id":"","reference_type":"","scores":[{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23632","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23353","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23472","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23509","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23521","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2514","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25101","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24914","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24953","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24961","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24948","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25002","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25042","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25028","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24983","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11692"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328946","reference_id":"2328946","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328946"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-03","reference_id":"GLSA-202505-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-03"},{"reference_url":"https://security.gentoo.org/glsa/202509-02","reference_id":"GLSA-202509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-63/","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:45:17Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-63/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-64","reference_id":"mfsa2024-64","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-64"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-64/","reference_id":"mfsa2024-64","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:45:17Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-64/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-67/","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:45:17Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-67/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-68","reference_id":"mfsa2024-68","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-68"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-68/","reference_id":"mfsa2024-68","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:45:17Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-68/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10591","reference_id":"RHSA-2024:10591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10592","reference_id":"RHSA-2024:10592","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10667","reference_id":"RHSA-2024:10667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10702","reference_id":"RHSA-2024:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10703","reference_id":"RHSA-2024:10703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10704","reference_id":"RHSA-2024:10704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10710","reference_id":"RHSA-2024:10710","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10710"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10733","reference_id":"RHSA-2024:10733","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10733"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10734","reference_id":"RHSA-2024:10734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10742","reference_id":"RHSA-2024:10742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10743","reference_id":"RHSA-2024:10743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10745","reference_id":"RHSA-2024:10745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10748","reference_id":"RHSA-2024:10748","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10748"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10752","reference_id":"RHSA-2024:10752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10844","reference_id":"RHSA-2024:10844","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10844"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10848","reference_id":"RHSA-2024:10848","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10848"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10849","reference_id":"RHSA-2024:10849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10849"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10880","reference_id":"RHSA-2024:10880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10881","reference_id":"RHSA-2024:10881","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10881"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1909535","reference_id":"show_bug.cgi?id=1909535","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:45:17Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1909535"},{"reference_url":"https://usn.ubuntu.com/7134-1/","reference_id":"USN-7134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7134-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-11692"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-grjt-j4at-pqbp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36151?format=json","vulnerability_id":"VCID-hfx8-7x82-zqfk","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10466.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10466.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10466","reference_id":"","reference_type":"","scores":[{"value":"0.00669","scoring_system":"epss","scoring_elements":"0.71393","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00669","scoring_system":"epss","scoring_elements":"0.71406","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00669","scoring_system":"epss","scoring_elements":"0.71403","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00669","scoring_system":"epss","scoring_elements":"0.7129","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00669","scoring_system":"epss","scoring_elements":"0.71272","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00669","scoring_system":"epss","scoring_elements":"0.71265","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00669","scoring_system":"epss","scoring_elements":"0.71395","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00669","scoring_system":"epss","scoring_elements":"0.71341","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00669","scoring_system":"epss","scoring_elements":"0.71362","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00669","scoring_system":"epss","scoring_elements":"0.71356","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00669","scoring_system":"epss","scoring_elements":"0.7131","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00669","scoring_system":"epss","scoring_elements":"0.71327","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00669","scoring_system":"epss","scoring_elements":"0.71342","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00669","scoring_system":"epss","scoring_elements":"0.71319","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00669","scoring_system":"epss","scoring_elements":"0.71306","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10466"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322438","reference_id":"2322438","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322438"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-08","reference_id":"GLSA-202505-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-55","reference_id":"mfsa2024-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-55"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-55/","reference_id":"mfsa2024-55","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:30:57Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-55/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-56","reference_id":"mfsa2024-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-56"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-56/","reference_id":"mfsa2024-56","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:30:57Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-56/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-58","reference_id":"mfsa2024-58","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-58"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-58/","reference_id":"mfsa2024-58","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:30:57Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-58/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-59","reference_id":"mfsa2024-59","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-59"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-59/","reference_id":"mfsa2024-59","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:30:57Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-59/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8720","reference_id":"RHSA-2024:8720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8721","reference_id":"RHSA-2024:8721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8722","reference_id":"RHSA-2024:8722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8723","reference_id":"RHSA-2024:8723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8724","reference_id":"RHSA-2024:8724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8725","reference_id":"RHSA-2024:8725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8726","reference_id":"RHSA-2024:8726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8727","reference_id":"RHSA-2024:8727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8728","reference_id":"RHSA-2024:8728","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8728"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8729","reference_id":"RHSA-2024:8729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8790","reference_id":"RHSA-2024:8790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8793","reference_id":"RHSA-2024:8793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8793"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9015","reference_id":"RHSA-2024:9015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9016","reference_id":"RHSA-2024:9016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9017","reference_id":"RHSA-2024:9017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9018","reference_id":"RHSA-2024:9018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9019","reference_id":"RHSA-2024:9019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9552","reference_id":"RHSA-2024:9552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9554","reference_id":"RHSA-2024:9554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9554"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1924154","reference_id":"show_bug.cgi?id=1924154","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:30:57Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1924154"},{"reference_url":"https://usn.ubuntu.com/7086-1/","reference_id":"USN-7086-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7086-1/"},{"reference_url":"https://usn.ubuntu.com/7991-1/","reference_id":"USN-7991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-10466"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hfx8-7x82-zqfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42000?format=json","vulnerability_id":"VCID-j5k8-ztxb-uffb","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0238.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0238.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0238","reference_id":"","reference_type":"","scores":[{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.29969","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30485","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30305","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.3019","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30109","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32078","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32165","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32076","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32042","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32073","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32112","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32204","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32027","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32108","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32053","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0238"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0238","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0238"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336165","reference_id":"2336165","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336165"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-03","reference_id":"GLSA-202505-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-03"},{"reference_url":"https://security.gentoo.org/glsa/202509-02","reference_id":"GLSA-202509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-01","reference_id":"mfsa2025-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-01"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-01/","reference_id":"mfsa2025-01","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:24:00Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-01/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-02","reference_id":"mfsa2025-02","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-02"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-02/","reference_id":"mfsa2025-02","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:24:00Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-02/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-03","reference_id":"mfsa2025-03","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-03"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-03/","reference_id":"mfsa2025-03","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:24:00Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-03/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-04","reference_id":"mfsa2025-04","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-04"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-04/","reference_id":"mfsa2025-04","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:24:00Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-04/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-05","reference_id":"mfsa2025-05","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-05"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-05/","reference_id":"mfsa2025-05","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:24:00Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-05/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0080","reference_id":"RHSA-2025:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0132","reference_id":"RHSA-2025:0132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0133","reference_id":"RHSA-2025:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0133"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0134","reference_id":"RHSA-2025:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0135","reference_id":"RHSA-2025:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0136","reference_id":"RHSA-2025:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0137","reference_id":"RHSA-2025:0137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0138","reference_id":"RHSA-2025:0138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0144","reference_id":"RHSA-2025:0144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0147","reference_id":"RHSA-2025:0147","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0147"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0162","reference_id":"RHSA-2025:0162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0165","reference_id":"RHSA-2025:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0166","reference_id":"RHSA-2025:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0167","reference_id":"RHSA-2025:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0275","reference_id":"RHSA-2025:0275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0275"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0281","reference_id":"RHSA-2025:0281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0284","reference_id":"RHSA-2025:0284","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0284"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0286","reference_id":"RHSA-2025:0286","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0286"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0287","reference_id":"RHSA-2025:0287","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0287"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1915535","reference_id":"show_bug.cgi?id=1915535","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:24:00Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1915535"},{"reference_url":"https://usn.ubuntu.com/7191-1/","reference_id":"USN-7191-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7191-1/"},{"reference_url":"https://usn.ubuntu.com/7663-1/","reference_id":"USN-7663-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7663-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2025-0238"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j5k8-ztxb-uffb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41994?format=json","vulnerability_id":"VCID-kc7w-zjh4-vqfq","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11701.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11701.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11701","reference_id":"","reference_type":"","scores":[{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40128","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40577","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.4054","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40521","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.4057","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40538","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40461","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40359","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40347","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40266","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40547","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40575","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40496","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40546","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40557","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11701"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328945","reference_id":"2328945","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328945"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-03","reference_id":"GLSA-202505-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-03"},{"reference_url":"https://security.gentoo.org/glsa/202509-02","reference_id":"GLSA-202509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-63/","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:41:32Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-63/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-67/","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:41:32Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-67/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1914797","reference_id":"show_bug.cgi?id=1914797","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:41:32Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1914797"},{"reference_url":"https://usn.ubuntu.com/7134-1/","reference_id":"USN-7134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7134-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-11701"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kc7w-zjh4-vqfq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36150?format=json","vulnerability_id":"VCID-mw96-qtnz-gqdx","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10465.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10465.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10465","reference_id":"","reference_type":"","scores":[{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66073","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66096","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66097","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66023","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.65994","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.6599","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66086","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66065","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66077","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66063","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66028","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66058","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66071","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66052","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.6604","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10465"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10465","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10465"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322434","reference_id":"2322434","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322434"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-08","reference_id":"GLSA-202505-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-55","reference_id":"mfsa2024-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-55"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-55/","reference_id":"mfsa2024-55","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:41:01Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-55/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-56","reference_id":"mfsa2024-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-56"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-56/","reference_id":"mfsa2024-56","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:41:01Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-56/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-58","reference_id":"mfsa2024-58","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-58"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-58/","reference_id":"mfsa2024-58","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:41:01Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-58/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-59","reference_id":"mfsa2024-59","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-59"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-59/","reference_id":"mfsa2024-59","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:41:01Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-59/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8720","reference_id":"RHSA-2024:8720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8721","reference_id":"RHSA-2024:8721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8722","reference_id":"RHSA-2024:8722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8723","reference_id":"RHSA-2024:8723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8724","reference_id":"RHSA-2024:8724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8725","reference_id":"RHSA-2024:8725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8726","reference_id":"RHSA-2024:8726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8727","reference_id":"RHSA-2024:8727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8728","reference_id":"RHSA-2024:8728","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8728"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8729","reference_id":"RHSA-2024:8729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8790","reference_id":"RHSA-2024:8790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8793","reference_id":"RHSA-2024:8793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8793"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9015","reference_id":"RHSA-2024:9015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9016","reference_id":"RHSA-2024:9016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9017","reference_id":"RHSA-2024:9017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9018","reference_id":"RHSA-2024:9018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9019","reference_id":"RHSA-2024:9019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9552","reference_id":"RHSA-2024:9552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9554","reference_id":"RHSA-2024:9554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9554"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1918853","reference_id":"show_bug.cgi?id=1918853","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:41:01Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1918853"},{"reference_url":"https://usn.ubuntu.com/7086-1/","reference_id":"USN-7086-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7086-1/"},{"reference_url":"https://usn.ubuntu.com/7991-1/","reference_id":"USN-7991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-10465"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mw96-qtnz-gqdx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36143?format=json","vulnerability_id":"VCID-n4hu-b1t6-xkay","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10458.json","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10458.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10458","reference_id":"","reference_type":"","scores":[{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63936","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63938","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63926","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.6392","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63856","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63891","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63841","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63884","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.6391","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63874","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63921","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63908","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10458"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322428","reference_id":"2322428","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322428"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-08","reference_id":"GLSA-202505-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-55","reference_id":"mfsa2024-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-55"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-55/","reference_id":"mfsa2024-55","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-55/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-56","reference_id":"mfsa2024-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-56"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-56/","reference_id":"mfsa2024-56","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-56/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-57","reference_id":"mfsa2024-57","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-57"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-57/","reference_id":"mfsa2024-57","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-57/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-58","reference_id":"mfsa2024-58","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-58"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-58/","reference_id":"mfsa2024-58","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-58/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-59","reference_id":"mfsa2024-59","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-59"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-59/","reference_id":"mfsa2024-59","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-59/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8720","reference_id":"RHSA-2024:8720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8721","reference_id":"RHSA-2024:8721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8722","reference_id":"RHSA-2024:8722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8723","reference_id":"RHSA-2024:8723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8724","reference_id":"RHSA-2024:8724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8725","reference_id":"RHSA-2024:8725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8726","reference_id":"RHSA-2024:8726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8727","reference_id":"RHSA-2024:8727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8728","reference_id":"RHSA-2024:8728","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8728"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8729","reference_id":"RHSA-2024:8729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8790","reference_id":"RHSA-2024:8790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8793","reference_id":"RHSA-2024:8793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8793"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9015","reference_id":"RHSA-2024:9015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9016","reference_id":"RHSA-2024:9016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9017","reference_id":"RHSA-2024:9017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9018","reference_id":"RHSA-2024:9018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9019","reference_id":"RHSA-2024:9019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9552","reference_id":"RHSA-2024:9552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9554","reference_id":"RHSA-2024:9554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9554"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1921733","reference_id":"show_bug.cgi?id=1921733","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1921733"},{"reference_url":"https://usn.ubuntu.com/7086-1/","reference_id":"USN-7086-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7086-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-10458"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n4hu-b1t6-xkay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42003?format=json","vulnerability_id":"VCID-qtcm-9z3v-dydn","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0241.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0241.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0241","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22491","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22547","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22335","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22417","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22472","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2245","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22504","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22086","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22191","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22199","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22212","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22361","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22411","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22413","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22396","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0241"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336168","reference_id":"2336168","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336168"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-03","reference_id":"GLSA-202505-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-03"},{"reference_url":"https://security.gentoo.org/glsa/202509-02","reference_id":"GLSA-202509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-01","reference_id":"mfsa2025-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-01"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-01/","reference_id":"mfsa2025-01","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-08T17:27:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-01/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-02","reference_id":"mfsa2025-02","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-02"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-02/","reference_id":"mfsa2025-02","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-08T17:27:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-02/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-04","reference_id":"mfsa2025-04","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-04"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-04/","reference_id":"mfsa2025-04","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-08T17:27:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-04/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-05","reference_id":"mfsa2025-05","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-05"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-05/","reference_id":"mfsa2025-05","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-08T17:27:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-05/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0080","reference_id":"RHSA-2025:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0132","reference_id":"RHSA-2025:0132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0133","reference_id":"RHSA-2025:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0133"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0134","reference_id":"RHSA-2025:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0135","reference_id":"RHSA-2025:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0136","reference_id":"RHSA-2025:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0137","reference_id":"RHSA-2025:0137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0138","reference_id":"RHSA-2025:0138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0144","reference_id":"RHSA-2025:0144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0147","reference_id":"RHSA-2025:0147","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0147"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0162","reference_id":"RHSA-2025:0162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0165","reference_id":"RHSA-2025:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0166","reference_id":"RHSA-2025:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0167","reference_id":"RHSA-2025:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0275","reference_id":"RHSA-2025:0275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0275"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0281","reference_id":"RHSA-2025:0281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0284","reference_id":"RHSA-2025:0284","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0284"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0286","reference_id":"RHSA-2025:0286","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0286"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0287","reference_id":"RHSA-2025:0287","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0287"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1933023","reference_id":"show_bug.cgi?id=1933023","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-08T17:27:29Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1933023"},{"reference_url":"https://usn.ubuntu.com/7191-1/","reference_id":"USN-7191-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7191-1/"},{"reference_url":"https://usn.ubuntu.com/7991-1/","reference_id":"USN-7991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2025-0241"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qtcm-9z3v-dydn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41993?format=json","vulnerability_id":"VCID-qzb8-5u9j-27g1","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11700.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11700.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11700","reference_id":"","reference_type":"","scores":[{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41568","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41582","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41615","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41594","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41585","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41535","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.4158","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41608","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50016","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50177","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50151","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50136","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50143","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50096","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11700"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328938","reference_id":"2328938","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328938"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-03","reference_id":"GLSA-202505-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-03"},{"reference_url":"https://security.gentoo.org/glsa/202509-02","reference_id":"GLSA-202509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-63/","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:50:18Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-63/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-67/","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:50:18Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-67/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1836921","reference_id":"show_bug.cgi?id=1836921","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:50:18Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1836921"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-11700"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qzb8-5u9j-27g1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41999?format=json","vulnerability_id":"VCID-r7ss-g876-c7fg","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0237.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0237.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0237","reference_id":"","reference_type":"","scores":[{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28036","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30893","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30979","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30859","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30879","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30848","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31026","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30845","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30903","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30933","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30935","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.312","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.30845","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.30998","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31076","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0237"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0237","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0237"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336182","reference_id":"2336182","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336182"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-03","reference_id":"GLSA-202505-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-03"},{"reference_url":"https://security.gentoo.org/glsa/202509-02","reference_id":"GLSA-202509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-01","reference_id":"mfsa2025-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-01"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-01/","reference_id":"mfsa2025-01","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T15:57:56Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-01/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-02","reference_id":"mfsa2025-02","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-02"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-02/","reference_id":"mfsa2025-02","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T15:57:56Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-02/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-04","reference_id":"mfsa2025-04","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-04"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-04/","reference_id":"mfsa2025-04","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T15:57:56Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-04/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-05","reference_id":"mfsa2025-05","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-05"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-05/","reference_id":"mfsa2025-05","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T15:57:56Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-05/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0080","reference_id":"RHSA-2025:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0132","reference_id":"RHSA-2025:0132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0133","reference_id":"RHSA-2025:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0133"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0134","reference_id":"RHSA-2025:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0135","reference_id":"RHSA-2025:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0136","reference_id":"RHSA-2025:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0137","reference_id":"RHSA-2025:0137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0138","reference_id":"RHSA-2025:0138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0144","reference_id":"RHSA-2025:0144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0147","reference_id":"RHSA-2025:0147","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0147"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0162","reference_id":"RHSA-2025:0162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0165","reference_id":"RHSA-2025:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0166","reference_id":"RHSA-2025:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0167","reference_id":"RHSA-2025:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0275","reference_id":"RHSA-2025:0275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0275"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0281","reference_id":"RHSA-2025:0281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0284","reference_id":"RHSA-2025:0284","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0284"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0286","reference_id":"RHSA-2025:0286","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0286"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0287","reference_id":"RHSA-2025:0287","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0287"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1915257","reference_id":"show_bug.cgi?id=1915257","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T15:57:56Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1915257"},{"reference_url":"https://usn.ubuntu.com/7191-1/","reference_id":"USN-7191-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7191-1/"},{"reference_url":"https://usn.ubuntu.com/7991-1/","reference_id":"USN-7991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2025-0237"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r7ss-g876-c7fg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36148?format=json","vulnerability_id":"VCID-rcg4-7hjg-v7du","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10463.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10463.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10463","reference_id":"","reference_type":"","scores":[{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64521","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64547","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64535","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64514","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64447","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64484","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64436","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64477","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64522","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.6451","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64476","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64516","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64501","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10463"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10463","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10463"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322439","reference_id":"2322439","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322439"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-08","reference_id":"GLSA-202505-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-55","reference_id":"mfsa2024-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-55"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-55/","reference_id":"mfsa2024-55","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-55/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-56","reference_id":"mfsa2024-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-56"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-56/","reference_id":"mfsa2024-56","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-56/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-57","reference_id":"mfsa2024-57","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-57"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-57/","reference_id":"mfsa2024-57","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-57/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-58","reference_id":"mfsa2024-58","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-58"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-58/","reference_id":"mfsa2024-58","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-58/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-59","reference_id":"mfsa2024-59","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-59"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-59/","reference_id":"mfsa2024-59","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-59/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8720","reference_id":"RHSA-2024:8720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8721","reference_id":"RHSA-2024:8721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8722","reference_id":"RHSA-2024:8722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8723","reference_id":"RHSA-2024:8723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8724","reference_id":"RHSA-2024:8724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8725","reference_id":"RHSA-2024:8725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8726","reference_id":"RHSA-2024:8726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8727","reference_id":"RHSA-2024:8727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8728","reference_id":"RHSA-2024:8728","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8728"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8729","reference_id":"RHSA-2024:8729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8790","reference_id":"RHSA-2024:8790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8793","reference_id":"RHSA-2024:8793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8793"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9015","reference_id":"RHSA-2024:9015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9016","reference_id":"RHSA-2024:9016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9017","reference_id":"RHSA-2024:9017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9018","reference_id":"RHSA-2024:9018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9019","reference_id":"RHSA-2024:9019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9552","reference_id":"RHSA-2024:9552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9554","reference_id":"RHSA-2024:9554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9554"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1920800","reference_id":"show_bug.cgi?id=1920800","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1920800"},{"reference_url":"https://usn.ubuntu.com/7086-1/","reference_id":"USN-7086-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7086-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-10463"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rcg4-7hjg-v7du"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36146?format=json","vulnerability_id":"VCID-sg2y-gfue-6qam","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10461.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10461.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10461","reference_id":"","reference_type":"","scores":[{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.76389","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.76378","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.7637","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.76248","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.76291","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.76259","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.76278","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.76335","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.7635","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.76345","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.76309","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.76331","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.76305","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10461"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10461","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10461"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322425","reference_id":"2322425","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322425"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-08","reference_id":"GLSA-202505-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-55","reference_id":"mfsa2024-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-55"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-55/","reference_id":"mfsa2024-55","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:04:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-55/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-56","reference_id":"mfsa2024-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-56"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-56/","reference_id":"mfsa2024-56","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:04:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-56/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-58","reference_id":"mfsa2024-58","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-58"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-58/","reference_id":"mfsa2024-58","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:04:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-58/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-59","reference_id":"mfsa2024-59","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-59"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-59/","reference_id":"mfsa2024-59","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:04:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-59/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8720","reference_id":"RHSA-2024:8720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8721","reference_id":"RHSA-2024:8721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8722","reference_id":"RHSA-2024:8722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8723","reference_id":"RHSA-2024:8723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8724","reference_id":"RHSA-2024:8724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8725","reference_id":"RHSA-2024:8725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8726","reference_id":"RHSA-2024:8726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8727","reference_id":"RHSA-2024:8727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8728","reference_id":"RHSA-2024:8728","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8728"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8729","reference_id":"RHSA-2024:8729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8790","reference_id":"RHSA-2024:8790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8793","reference_id":"RHSA-2024:8793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8793"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9015","reference_id":"RHSA-2024:9015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9016","reference_id":"RHSA-2024:9016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9017","reference_id":"RHSA-2024:9017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9018","reference_id":"RHSA-2024:9018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9019","reference_id":"RHSA-2024:9019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9552","reference_id":"RHSA-2024:9552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9554","reference_id":"RHSA-2024:9554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9554"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1914521","reference_id":"show_bug.cgi?id=1914521","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:04:49Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1914521"},{"reference_url":"https://usn.ubuntu.com/7086-1/","reference_id":"USN-7086-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7086-1/"},{"reference_url":"https://usn.ubuntu.com/7991-1/","reference_id":"USN-7991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-10461"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sg2y-gfue-6qam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42002?format=json","vulnerability_id":"VCID-tgpf-32kg-rqc2","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0240.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0240.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0240","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14868","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14809","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14997","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.148","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1489","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14941","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14906","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1492","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14633","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14752","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14808","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1481","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14773","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14714","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14706","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0240"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0240","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0240"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336188","reference_id":"2336188","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336188"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-03","reference_id":"GLSA-202505-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-03"},{"reference_url":"https://security.gentoo.org/glsa/202509-02","reference_id":"GLSA-202509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-01","reference_id":"mfsa2025-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-01"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-01/","reference_id":"mfsa2025-01","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:36:55Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-01/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-02","reference_id":"mfsa2025-02","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-02"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-02/","reference_id":"mfsa2025-02","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:36:55Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-02/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-04","reference_id":"mfsa2025-04","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-04"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-04/","reference_id":"mfsa2025-04","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:36:55Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-04/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-05","reference_id":"mfsa2025-05","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-05"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-05/","reference_id":"mfsa2025-05","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:36:55Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-05/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0080","reference_id":"RHSA-2025:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0132","reference_id":"RHSA-2025:0132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0133","reference_id":"RHSA-2025:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0133"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0134","reference_id":"RHSA-2025:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0135","reference_id":"RHSA-2025:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0136","reference_id":"RHSA-2025:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0137","reference_id":"RHSA-2025:0137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0138","reference_id":"RHSA-2025:0138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0144","reference_id":"RHSA-2025:0144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0147","reference_id":"RHSA-2025:0147","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0147"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0162","reference_id":"RHSA-2025:0162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0165","reference_id":"RHSA-2025:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0166","reference_id":"RHSA-2025:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0167","reference_id":"RHSA-2025:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0275","reference_id":"RHSA-2025:0275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0275"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0281","reference_id":"RHSA-2025:0281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0284","reference_id":"RHSA-2025:0284","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0284"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0286","reference_id":"RHSA-2025:0286","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0286"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0287","reference_id":"RHSA-2025:0287","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0287"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1929623","reference_id":"show_bug.cgi?id=1929623","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:36:55Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1929623"},{"reference_url":"https://usn.ubuntu.com/7191-1/","reference_id":"USN-7191-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7191-1/"},{"reference_url":"https://usn.ubuntu.com/7991-1/","reference_id":"USN-7991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2025-0240"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tgpf-32kg-rqc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42005?format=json","vulnerability_id":"VCID-ukf2-qcjg-u7bg","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0243.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0243.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0243","reference_id":"","reference_type":"","scores":[{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08508","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08488","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08503","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08521","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08516","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08435","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08527","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0846","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08417","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08469","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08481","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08363","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08379","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0243"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0243","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0243"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336175","reference_id":"2336175","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336175"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1827142%2C1932783","reference_id":"buglist.cgi?bug_id=1827142%2C1932783","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T16:44:56Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1827142%2C1932783"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-03","reference_id":"GLSA-202505-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-03"},{"reference_url":"https://security.gentoo.org/glsa/202509-02","reference_id":"GLSA-202509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-01","reference_id":"mfsa2025-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-01"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-01/","reference_id":"mfsa2025-01","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T16:44:56Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-01/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-02","reference_id":"mfsa2025-02","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-02"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-02/","reference_id":"mfsa2025-02","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T16:44:56Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-02/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-04","reference_id":"mfsa2025-04","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-04"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-04/","reference_id":"mfsa2025-04","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T16:44:56Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-04/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-05","reference_id":"mfsa2025-05","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-05"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2025-05/","reference_id":"mfsa2025-05","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-08T16:44:56Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2025-05/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0080","reference_id":"RHSA-2025:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0132","reference_id":"RHSA-2025:0132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0133","reference_id":"RHSA-2025:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0133"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0134","reference_id":"RHSA-2025:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0135","reference_id":"RHSA-2025:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0136","reference_id":"RHSA-2025:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0137","reference_id":"RHSA-2025:0137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0138","reference_id":"RHSA-2025:0138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0144","reference_id":"RHSA-2025:0144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0147","reference_id":"RHSA-2025:0147","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0147"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0162","reference_id":"RHSA-2025:0162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0165","reference_id":"RHSA-2025:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0166","reference_id":"RHSA-2025:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0167","reference_id":"RHSA-2025:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0275","reference_id":"RHSA-2025:0275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0275"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0281","reference_id":"RHSA-2025:0281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0284","reference_id":"RHSA-2025:0284","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0284"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0286","reference_id":"RHSA-2025:0286","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0286"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0287","reference_id":"RHSA-2025:0287","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0287"},{"reference_url":"https://usn.ubuntu.com/7191-1/","reference_id":"USN-7191-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7191-1/"},{"reference_url":"https://usn.ubuntu.com/7991-1/","reference_id":"USN-7991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2025-0243"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ukf2-qcjg-u7bg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36152?format=json","vulnerability_id":"VCID-vdpy-f9d9-pfac","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10467.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10467.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10467","reference_id":"","reference_type":"","scores":[{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67353","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67376","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67365","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67346","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67368","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67305","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67334","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67283","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67282","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67321","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67356","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67369","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67348","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10467"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10467","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10467"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322433","reference_id":"2322433","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322433"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1829029%2C1888538%2C1900394%2C1904059%2C1917742%2C1919809%2C1923706","reference_id":"buglist.cgi?bug_id=1829029%2C1888538%2C1900394%2C1904059%2C1917742%2C1919809%2C1923706","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:23:47Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1829029%2C1888538%2C1900394%2C1904059%2C1917742%2C1919809%2C1923706"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-08","reference_id":"GLSA-202505-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-55","reference_id":"mfsa2024-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-55"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-55/","reference_id":"mfsa2024-55","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:23:47Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-55/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-56","reference_id":"mfsa2024-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-56"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-56/","reference_id":"mfsa2024-56","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:23:47Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-56/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-58","reference_id":"mfsa2024-58","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-58"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-58/","reference_id":"mfsa2024-58","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:23:47Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-58/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-59","reference_id":"mfsa2024-59","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-59"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-59/","reference_id":"mfsa2024-59","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:23:47Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-59/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8720","reference_id":"RHSA-2024:8720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8721","reference_id":"RHSA-2024:8721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8722","reference_id":"RHSA-2024:8722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8723","reference_id":"RHSA-2024:8723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8724","reference_id":"RHSA-2024:8724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8725","reference_id":"RHSA-2024:8725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8726","reference_id":"RHSA-2024:8726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8727","reference_id":"RHSA-2024:8727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8728","reference_id":"RHSA-2024:8728","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8728"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8729","reference_id":"RHSA-2024:8729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8790","reference_id":"RHSA-2024:8790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8793","reference_id":"RHSA-2024:8793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8793"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9015","reference_id":"RHSA-2024:9015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9016","reference_id":"RHSA-2024:9016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9017","reference_id":"RHSA-2024:9017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9018","reference_id":"RHSA-2024:9018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9019","reference_id":"RHSA-2024:9019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9552","reference_id":"RHSA-2024:9552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9554","reference_id":"RHSA-2024:9554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9554"},{"reference_url":"https://usn.ubuntu.com/7086-1/","reference_id":"USN-7086-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7086-1/"},{"reference_url":"https://usn.ubuntu.com/7991-1/","reference_id":"USN-7991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-10467"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vdpy-f9d9-pfac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41992?format=json","vulnerability_id":"VCID-w7gj-shrq-3fcz","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11699.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11699.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11699","reference_id":"","reference_type":"","scores":[{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26085","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26109","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26104","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26163","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26208","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26201","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26152","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26272","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26313","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.3011","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30191","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.2997","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30305","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30486","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32054","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11699"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11699","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11699"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328947","reference_id":"2328947","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328947"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1880582%2C1929911","reference_id":"buglist.cgi?bug_id=1880582%2C1929911","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:00:52Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1880582%2C1929911"},{"reference_url":"https://security.gentoo.org/glsa/202501-10","reference_id":"GLSA-202501-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-10"},{"reference_url":"https://security.gentoo.org/glsa/202505-03","reference_id":"GLSA-202505-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-03"},{"reference_url":"https://security.gentoo.org/glsa/202509-02","reference_id":"GLSA-202509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-63"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-63/","reference_id":"mfsa2024-63","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:00:52Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-63/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-64","reference_id":"mfsa2024-64","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-64"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-64/","reference_id":"mfsa2024-64","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:00:52Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-64/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-67"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-67/","reference_id":"mfsa2024-67","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:00:52Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-67/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-68","reference_id":"mfsa2024-68","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-68"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-68/","reference_id":"mfsa2024-68","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:00:52Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-68/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10591","reference_id":"RHSA-2024:10591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10592","reference_id":"RHSA-2024:10592","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10667","reference_id":"RHSA-2024:10667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10702","reference_id":"RHSA-2024:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10703","reference_id":"RHSA-2024:10703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10704","reference_id":"RHSA-2024:10704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10710","reference_id":"RHSA-2024:10710","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10710"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10733","reference_id":"RHSA-2024:10733","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10733"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10734","reference_id":"RHSA-2024:10734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10742","reference_id":"RHSA-2024:10742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10743","reference_id":"RHSA-2024:10743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10745","reference_id":"RHSA-2024:10745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10748","reference_id":"RHSA-2024:10748","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10748"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10752","reference_id":"RHSA-2024:10752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10844","reference_id":"RHSA-2024:10844","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10844"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10848","reference_id":"RHSA-2024:10848","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10848"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10849","reference_id":"RHSA-2024:10849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10849"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10880","reference_id":"RHSA-2024:10880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10881","reference_id":"RHSA-2024:10881","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10881"},{"reference_url":"https://usn.ubuntu.com/7134-1/","reference_id":"USN-7134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7134-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75872?format=json","purl":"pkg:ebuild/www-client/firefox@128.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@128.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75873?format=json","purl":"pkg:ebuild/www-client/firefox@134.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}],"aliases":["CVE-2024-11699"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w7gj-shrq-3fcz"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@134.0"}