{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","type":"ebuild","namespace":"www-client","name":"firefox","version":"127.0","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"128.3.1","latest_non_vulnerable_version":"137.0.1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50630?format=json","vulnerability_id":"VCID-2q4w-u64u-rbh2","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4778","reference_id":"","reference_type":"","scores":[{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.6183","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61759","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61716","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61745","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61799","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61814","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61617","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61647","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61665","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.6168","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61702","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.6169","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61672","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61712","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61718","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61701","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61693","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61711","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61704","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61649","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61696","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4778"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1838834%2C1889291%2C1889595%2C1890204%2C1891545","reference_id":"buglist.cgi?bug_id=1838834%2C1889291%2C1889595%2C1890204%2C1891545","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-16T18:42:04Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1838834%2C1889291%2C1889595%2C1890204%2C1891545"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-21","reference_id":"mfsa2024-21","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-21"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-21/","reference_id":"mfsa2024-21","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-16T18:42:04Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-21/"},{"reference_url":"https://usn.ubuntu.com/6779-1/","reference_id":"USN-6779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6779-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-4778"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2q4w-u64u-rbh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47588?format=json","vulnerability_id":"VCID-2zdh-azdw-tuav","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2609.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2609.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2609","reference_id":"","reference_type":"","scores":[{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.77495","published_at":"2026-05-16T12:55:00Z"},{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.7749","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.77475","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.77429","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.7741","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.7742","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.77399","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.77372","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.77364","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.77352","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.77312","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.77346","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.78133","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.78121","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.78151","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.78159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.78166","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.78191","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.78174","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.7817","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.78203","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.78201","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275551","reference_id":"2275551","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275551"},{"reference_url":"https://security.gentoo.org/glsa/202405-32","reference_id":"GLSA-202405-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-32"},{"reference_url":"https://security.gentoo.org/glsa/202407-19","reference_id":"GLSA-202407-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-19"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-12"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-12/","reference_id":"mfsa2024-12","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T15:04:02Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-12/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-19","reference_id":"mfsa2024-19","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-19"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-19/","reference_id":"mfsa2024-19","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T15:04:02Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-19/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-20","reference_id":"mfsa2024-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-20"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-20/","reference_id":"mfsa2024-20","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T15:04:02Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-20/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html","reference_id":"msg00012.html","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T15:04:02Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html","reference_id":"msg00013.html","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T15:04:02Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1904","reference_id":"RHSA-2024:1904","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1904"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1905","reference_id":"RHSA-2024:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1906","reference_id":"RHSA-2024:1906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1907","reference_id":"RHSA-2024:1907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1908","reference_id":"RHSA-2024:1908","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1908"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1909","reference_id":"RHSA-2024:1909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1910","reference_id":"RHSA-2024:1910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1911","reference_id":"RHSA-2024:1911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1912","reference_id":"RHSA-2024:1912","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1912"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1934","reference_id":"RHSA-2024:1934","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1934"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1935","reference_id":"RHSA-2024:1935","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1935"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1936","reference_id":"RHSA-2024:1936","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1936"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1937","reference_id":"RHSA-2024:1937","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1937"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1938","reference_id":"RHSA-2024:1938","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1938"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1939","reference_id":"RHSA-2024:1939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1940","reference_id":"RHSA-2024:1940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1941","reference_id":"RHSA-2024:1941","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1982","reference_id":"RHSA-2024:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1982"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1866100","reference_id":"show_bug.cgi?id=1866100","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T15:04:02Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1866100"},{"reference_url":"https://usn.ubuntu.com/6703-1/","reference_id":"USN-6703-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6703-1/"},{"reference_url":"https://usn.ubuntu.com/6750-1/","reference_id":"USN-6750-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6750-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-2609"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2zdh-azdw-tuav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50618?format=json","vulnerability_id":"VCID-35af-887a-cbcg","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3860","reference_id":"","reference_type":"","scores":[{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15837","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1549","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15611","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15694","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15729","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15802","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15818","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15759","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15826","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1563","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15714","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15774","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15742","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15707","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15642","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15575","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15585","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15635","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15681","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15678","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15619","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3860"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-18/","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:52:58Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-18/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1881417","reference_id":"show_bug.cgi?id=1881417","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:52:58Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1881417"},{"reference_url":"https://usn.ubuntu.com/6747-1/","reference_id":"USN-6747-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6747-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-3860"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-35af-887a-cbcg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50616?format=json","vulnerability_id":"VCID-3ekg-4fq3-4bdc","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3856","reference_id":"","reference_type":"","scores":[{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.5703","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57031","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57049","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57099","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.6465","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64635","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64572","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64626","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64549","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64578","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64533","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64486","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69842","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69807","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69829","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69815","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.698","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71656","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71668","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71629","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71638","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3856"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-18/","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-12T20:40:01Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-18/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1885829","reference_id":"show_bug.cgi?id=1885829","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-12T20:40:01Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1885829"},{"reference_url":"https://usn.ubuntu.com/6747-1/","reference_id":"USN-6747-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6747-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-3856"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3ekg-4fq3-4bdc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47591?format=json","vulnerability_id":"VCID-3pvs-3ppc-r7a5","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3857.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3857.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3857","reference_id":"","reference_type":"","scores":[{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31714","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31332","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31415","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31543","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33383","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.3338","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33347","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33303","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33433","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33465","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33334","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33358","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33319","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33342","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35046","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.34906","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.34978","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35014","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.34919","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.34946","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35015","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35032","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275550","reference_id":"2275550","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275550"},{"reference_url":"https://security.gentoo.org/glsa/202405-32","reference_id":"GLSA-202405-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-32"},{"reference_url":"https://security.gentoo.org/glsa/202407-19","reference_id":"GLSA-202407-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-19"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-18/","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T13:57:00Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-18/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-19","reference_id":"mfsa2024-19","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-19"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-19/","reference_id":"mfsa2024-19","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T13:57:00Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-19/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-20","reference_id":"mfsa2024-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-20"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-20/","reference_id":"mfsa2024-20","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T13:57:00Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-20/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html","reference_id":"msg00012.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T13:57:00Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html","reference_id":"msg00013.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T13:57:00Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1904","reference_id":"RHSA-2024:1904","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1904"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1905","reference_id":"RHSA-2024:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1906","reference_id":"RHSA-2024:1906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1907","reference_id":"RHSA-2024:1907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1908","reference_id":"RHSA-2024:1908","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1908"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1909","reference_id":"RHSA-2024:1909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1910","reference_id":"RHSA-2024:1910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1911","reference_id":"RHSA-2024:1911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1912","reference_id":"RHSA-2024:1912","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1912"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1934","reference_id":"RHSA-2024:1934","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1934"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1935","reference_id":"RHSA-2024:1935","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1935"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1936","reference_id":"RHSA-2024:1936","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1936"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1937","reference_id":"RHSA-2024:1937","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1937"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1938","reference_id":"RHSA-2024:1938","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1938"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1939","reference_id":"RHSA-2024:1939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1940","reference_id":"RHSA-2024:1940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1941","reference_id":"RHSA-2024:1941","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1982","reference_id":"RHSA-2024:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1982"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1886683","reference_id":"show_bug.cgi?id=1886683","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T13:57:00Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1886683"},{"reference_url":"https://usn.ubuntu.com/6747-1/","reference_id":"USN-6747-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6747-1/"},{"reference_url":"https://usn.ubuntu.com/6750-1/","reference_id":"USN-6750-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6750-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-3857"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3pvs-3ppc-r7a5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50617?format=json","vulnerability_id":"VCID-4q92-3x61-ukep","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3858","reference_id":"","reference_type":"","scores":[{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53619","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53588","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53591","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67622","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67603","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67612","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67588","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67601","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67624","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67578","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.6761","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67635","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67632","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00729","scoring_system":"epss","scoring_elements":"0.72836","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00729","scoring_system":"epss","scoring_elements":"0.72752","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00729","scoring_system":"epss","scoring_elements":"0.72776","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00729","scoring_system":"epss","scoring_elements":"0.7274","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00729","scoring_system":"epss","scoring_elements":"0.72765","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00729","scoring_system":"epss","scoring_elements":"0.7282","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00729","scoring_system":"epss","scoring_elements":"0.72828","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00729","scoring_system":"epss","scoring_elements":"0.72722","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3858"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-18/","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-17T18:23:22Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-18/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1888892","reference_id":"show_bug.cgi?id=1888892","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-17T18:23:22Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1888892"},{"reference_url":"https://usn.ubuntu.com/6747-1/","reference_id":"USN-6747-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6747-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-3858"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4q92-3x61-ukep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50619?format=json","vulnerability_id":"VCID-5j1d-9624-y3e2","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3862","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33473","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33383","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33423","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33336","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33361","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33439","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33465","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.34026","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.34057","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33912","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33954","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33986","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33984","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33942","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33918","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33955","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3394","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33908","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33534","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33513","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33428","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33316","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3862"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-18/","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-14T18:20:23Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-18/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1884457","reference_id":"show_bug.cgi?id=1884457","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-14T18:20:23Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1884457"},{"reference_url":"https://usn.ubuntu.com/6747-1/","reference_id":"USN-6747-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6747-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-3862"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5j1d-9624-y3e2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50633?format=json","vulnerability_id":"VCID-5vzu-hjqt-83ct","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5695","reference_id":"","reference_type":"","scores":[{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71456","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71388","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71351","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71379","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71434","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71444","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71196","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71214","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71189","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71231","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71245","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71268","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71253","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71237","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71283","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7129","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71267","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7132","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71327","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71331","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71317","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71353","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5695"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-25","reference_id":"mfsa2024-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-25"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-25/","reference_id":"mfsa2024-25","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-30T18:54:20Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-25/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1895579","reference_id":"show_bug.cgi?id=1895579","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-30T18:54:20Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1895579"},{"reference_url":"https://usn.ubuntu.com/6862-1/","reference_id":"USN-6862-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6862-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-5695"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5vzu-hjqt-83ct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50623?format=json","vulnerability_id":"VCID-65u4-c84h-qqa1","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4766","reference_id":"","reference_type":"","scores":[{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56246","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56151","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56127","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56079","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56192","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56141","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56165","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56226","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56241","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56175","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56196","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56232","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56242","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56218","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56201","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56234","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56236","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56204","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56129","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4766"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-21","reference_id":"mfsa2024-21","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-21"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-21/","reference_id":"mfsa2024-21","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T16:35:57Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-21/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1871214","reference_id":"show_bug.cgi?id=1871214","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T16:35:57Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1871214"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1871217","reference_id":"show_bug.cgi?id=1871217","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T16:35:57Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1871217"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-4766"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-65u4-c84h-qqa1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50627?format=json","vulnerability_id":"VCID-6nrk-u1nq-5ya8","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4774","reference_id":"","reference_type":"","scores":[{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11174","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11007","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11078","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11043","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11087","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11139","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11115","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11178","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11079","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11134","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11138","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11105","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11083","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10946","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10957","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11095","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11041","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10995","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1087","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4774"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-21","reference_id":"mfsa2024-21","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-21"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-21/","reference_id":"mfsa2024-21","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T19:31:39Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-21/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1886598","reference_id":"show_bug.cgi?id=1886598","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T19:31:39Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1886598"},{"reference_url":"https://usn.ubuntu.com/6779-1/","reference_id":"USN-6779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6779-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-4774"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6nrk-u1nq-5ya8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50632?format=json","vulnerability_id":"VCID-8bux-cyfn-pfhr","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5694","reference_id":"","reference_type":"","scores":[{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72418","published_at":"2026-05-16T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72355","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72317","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72344","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72402","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72408","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72181","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72202","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72176","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72213","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72226","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72249","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72232","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72219","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72262","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72271","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72258","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72304","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72313","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.7231","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.723","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72328","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5694"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-25","reference_id":"mfsa2024-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-25"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-25/","reference_id":"mfsa2024-25","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:34Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-25/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1895055","reference_id":"show_bug.cgi?id=1895055","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:34Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1895055"},{"reference_url":"https://usn.ubuntu.com/6862-1/","reference_id":"USN-6862-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6862-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-5694"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8bux-cyfn-pfhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47593?format=json","vulnerability_id":"VCID-8sba-dejt-vqfp","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3861.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3861.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3861","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3041","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30409","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30396","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30329","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30306","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30381","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30373","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30301","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30442","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30525","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30807","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30641","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3237","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32512","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32547","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32418","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32446","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32449","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32411","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32384","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3242","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32397","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275553","reference_id":"2275553","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275553"},{"reference_url":"https://security.gentoo.org/glsa/202405-32","reference_id":"GLSA-202405-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-32"},{"reference_url":"https://security.gentoo.org/glsa/202407-19","reference_id":"GLSA-202407-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-19"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-18/","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T00:42:31Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-18/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-19","reference_id":"mfsa2024-19","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-19"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-19/","reference_id":"mfsa2024-19","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T00:42:31Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-19/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-20","reference_id":"mfsa2024-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-20"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-20/","reference_id":"mfsa2024-20","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T00:42:31Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-20/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html","reference_id":"msg00012.html","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T00:42:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html","reference_id":"msg00013.html","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T00:42:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1904","reference_id":"RHSA-2024:1904","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1904"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1905","reference_id":"RHSA-2024:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1906","reference_id":"RHSA-2024:1906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1907","reference_id":"RHSA-2024:1907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1908","reference_id":"RHSA-2024:1908","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1908"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1909","reference_id":"RHSA-2024:1909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1910","reference_id":"RHSA-2024:1910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1911","reference_id":"RHSA-2024:1911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1912","reference_id":"RHSA-2024:1912","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1912"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1934","reference_id":"RHSA-2024:1934","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1934"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1935","reference_id":"RHSA-2024:1935","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1935"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1936","reference_id":"RHSA-2024:1936","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1936"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1937","reference_id":"RHSA-2024:1937","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1937"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1938","reference_id":"RHSA-2024:1938","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1938"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1939","reference_id":"RHSA-2024:1939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1940","reference_id":"RHSA-2024:1940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1941","reference_id":"RHSA-2024:1941","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1982","reference_id":"RHSA-2024:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1982"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1883158","reference_id":"show_bug.cgi?id=1883158","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T00:42:31Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1883158"},{"reference_url":"https://usn.ubuntu.com/6747-1/","reference_id":"USN-6747-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6747-1/"},{"reference_url":"https://usn.ubuntu.com/6750-1/","reference_id":"USN-6750-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6750-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-3861"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8sba-dejt-vqfp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50636?format=json","vulnerability_id":"VCID-9dmp-uv8y-suau","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5699","reference_id":"","reference_type":"","scores":[{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69503","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69437","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69406","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69431","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69477","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69489","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69242","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69262","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69243","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69293","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69311","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69333","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69316","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69288","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69327","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69337","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69369","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69376","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69381","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69359","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69402","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5699"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-25","reference_id":"mfsa2024-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-25"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-25/","reference_id":"mfsa2024-25","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:42Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-25/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1891349","reference_id":"show_bug.cgi?id=1891349","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:42Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1891349"},{"reference_url":"https://usn.ubuntu.com/6862-1/","reference_id":"USN-6862-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6862-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-5699"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9dmp-uv8y-suau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47594?format=json","vulnerability_id":"VCID-abt2-6a7f-pfba","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3864.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3864.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3864","reference_id":"","reference_type":"","scores":[{"value":"0.00983","scoring_system":"epss","scoring_elements":"0.77002","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00983","scoring_system":"epss","scoring_elements":"0.76995","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00983","scoring_system":"epss","scoring_elements":"0.7698","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00983","scoring_system":"epss","scoring_elements":"0.7693","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00983","scoring_system":"epss","scoring_elements":"0.76914","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00983","scoring_system":"epss","scoring_elements":"0.76926","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00983","scoring_system":"epss","scoring_elements":"0.76909","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00983","scoring_system":"epss","scoring_elements":"0.76879","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00983","scoring_system":"epss","scoring_elements":"0.76889","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00983","scoring_system":"epss","scoring_elements":"0.76877","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00983","scoring_system":"epss","scoring_elements":"0.76838","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00983","scoring_system":"epss","scoring_elements":"0.7687","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77658","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77649","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77676","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77692","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77718","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77702","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.777","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77737","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275555","reference_id":"2275555","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275555"},{"reference_url":"https://security.gentoo.org/glsa/202405-32","reference_id":"GLSA-202405-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-32"},{"reference_url":"https://security.gentoo.org/glsa/202407-19","reference_id":"GLSA-202407-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-19"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-18/","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-12T16:57:55Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-18/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-19","reference_id":"mfsa2024-19","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-19"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-19/","reference_id":"mfsa2024-19","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-12T16:57:55Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-19/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-20","reference_id":"mfsa2024-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-20"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-20/","reference_id":"mfsa2024-20","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-12T16:57:55Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-20/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html","reference_id":"msg00012.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-12T16:57:55Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html","reference_id":"msg00013.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-12T16:57:55Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1904","reference_id":"RHSA-2024:1904","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1904"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1905","reference_id":"RHSA-2024:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1906","reference_id":"RHSA-2024:1906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1907","reference_id":"RHSA-2024:1907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1908","reference_id":"RHSA-2024:1908","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1908"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1909","reference_id":"RHSA-2024:1909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1910","reference_id":"RHSA-2024:1910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1911","reference_id":"RHSA-2024:1911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1912","reference_id":"RHSA-2024:1912","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1912"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1934","reference_id":"RHSA-2024:1934","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1934"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1935","reference_id":"RHSA-2024:1935","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1935"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1936","reference_id":"RHSA-2024:1936","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1936"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1937","reference_id":"RHSA-2024:1937","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1937"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1938","reference_id":"RHSA-2024:1938","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1938"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1939","reference_id":"RHSA-2024:1939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1940","reference_id":"RHSA-2024:1940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1941","reference_id":"RHSA-2024:1941","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1982","reference_id":"RHSA-2024:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1982"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1888333","reference_id":"show_bug.cgi?id=1888333","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-12T16:57:55Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1888333"},{"reference_url":"https://usn.ubuntu.com/6747-1/","reference_id":"USN-6747-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6747-1/"},{"reference_url":"https://usn.ubuntu.com/6750-1/","reference_id":"USN-6750-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6750-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-3864"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-abt2-6a7f-pfba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50621?format=json","vulnerability_id":"VCID-aeku-1hmt-akbc","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4764","reference_id":"","reference_type":"","scores":[{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67775","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67658","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67694","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67665","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67691","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67749","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67762","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67541","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67562","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.6754","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67592","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67605","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67628","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67614","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67581","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67616","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67607","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67626","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67636","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67638","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67615","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4764"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-21","reference_id":"mfsa2024-21","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-21"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-21/","reference_id":"mfsa2024-21","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-14T19:02:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-21/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1879093","reference_id":"show_bug.cgi?id=1879093","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-14T19:02:29Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1879093"},{"reference_url":"https://usn.ubuntu.com/6779-1/","reference_id":"USN-6779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6779-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-4764"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aeku-1hmt-akbc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50622?format=json","vulnerability_id":"VCID-b7sc-ty24-k7gj","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4765","reference_id":"","reference_type":"","scores":[{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35688","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35571","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35642","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35663","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35594","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35659","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35676","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36218","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36054","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36103","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36122","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36128","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.3609","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36064","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36105","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36038","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35806","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35773","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35686","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4765"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-21","reference_id":"mfsa2024-21","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-21"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-21/","reference_id":"mfsa2024-21","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-08T18:46:51Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-21/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1871109","reference_id":"show_bug.cgi?id=1871109","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-08T18:46:51Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1871109"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-4765"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b7sc-ty24-k7gj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36099?format=json","vulnerability_id":"VCID-b9aw-u5wp-6uhk","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5693.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5693.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5693","reference_id":"","reference_type":"","scores":[{"value":"0.0147","scoring_system":"epss","scoring_elements":"0.81012","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0147","scoring_system":"epss","scoring_elements":"0.80999","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0147","scoring_system":"epss","scoring_elements":"0.80987","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0147","scoring_system":"epss","scoring_elements":"0.80979","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0147","scoring_system":"epss","scoring_elements":"0.80959","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0147","scoring_system":"epss","scoring_elements":"0.80958","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0147","scoring_system":"epss","scoring_elements":"0.80956","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0147","scoring_system":"epss","scoring_elements":"0.80921","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0147","scoring_system":"epss","scoring_elements":"0.8093","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0147","scoring_system":"epss","scoring_elements":"0.80944","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0147","scoring_system":"epss","scoring_elements":"0.80928","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0147","scoring_system":"epss","scoring_elements":"0.80919","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0147","scoring_system":"epss","scoring_elements":"0.80891","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0147","scoring_system":"epss","scoring_elements":"0.80871","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0147","scoring_system":"epss","scoring_elements":"0.80894","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01765","scoring_system":"epss","scoring_elements":"0.82824","published_at":"2026-05-16T12:55:00Z"},{"value":"0.01765","scoring_system":"epss","scoring_elements":"0.82739","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01765","scoring_system":"epss","scoring_elements":"0.8276","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01765","scoring_system":"epss","scoring_elements":"0.82758","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01765","scoring_system":"epss","scoring_elements":"0.82773","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01765","scoring_system":"epss","scoring_elements":"0.82813","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01765","scoring_system":"epss","scoring_elements":"0.82822","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5693"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2291399","reference_id":"2291399","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2291399"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202412-13","reference_id":"GLSA-202412-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-25","reference_id":"mfsa2024-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-25"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-25/","reference_id":"mfsa2024-25","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-25/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-26","reference_id":"mfsa2024-26","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-26"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-26/","reference_id":"mfsa2024-26","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-26/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-28","reference_id":"mfsa2024-28","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-28"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-28/","reference_id":"mfsa2024-28","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-28/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html","reference_id":"msg00000.html","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html","reference_id":"msg00010.html","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3949","reference_id":"RHSA-2024:3949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3950","reference_id":"RHSA-2024:3950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3951","reference_id":"RHSA-2024:3951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3952","reference_id":"RHSA-2024:3952","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3952"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3953","reference_id":"RHSA-2024:3953","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3953"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3954","reference_id":"RHSA-2024:3954","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3955","reference_id":"RHSA-2024:3955","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3955"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3958","reference_id":"RHSA-2024:3958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3972","reference_id":"RHSA-2024:3972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4001","reference_id":"RHSA-2024:4001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4002","reference_id":"RHSA-2024:4002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4003","reference_id":"RHSA-2024:4003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4004","reference_id":"RHSA-2024:4004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4015","reference_id":"RHSA-2024:4015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4016","reference_id":"RHSA-2024:4016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4018","reference_id":"RHSA-2024:4018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4036","reference_id":"RHSA-2024:4036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4063","reference_id":"RHSA-2024:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4063"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1891319","reference_id":"show_bug.cgi?id=1891319","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1891319"},{"reference_url":"https://usn.ubuntu.com/6840-1/","reference_id":"USN-6840-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6840-1/"},{"reference_url":"https://usn.ubuntu.com/6862-1/","reference_id":"USN-6862-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6862-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-5693"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b9aw-u5wp-6uhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36101?format=json","vulnerability_id":"VCID-bshu-jxhj-27b8","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5700.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5700.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5700","reference_id":"","reference_type":"","scores":[{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37813","published_at":"2026-05-16T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38199","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38175","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.3822","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38201","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38136","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37962","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37939","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37844","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37733","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37801","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37815","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37727","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.377","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37777","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.3779","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38265","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38288","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38156","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38207","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38215","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38234","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2291401","reference_id":"2291401","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2291401"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1862809%2C1889355%2C1893388%2C1895123","reference_id":"buglist.cgi?bug_id=1862809%2C1889355%2C1893388%2C1895123","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1862809%2C1889355%2C1893388%2C1895123"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202412-13","reference_id":"GLSA-202412-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-25","reference_id":"mfsa2024-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-25"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-25/","reference_id":"mfsa2024-25","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-25/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-26","reference_id":"mfsa2024-26","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-26"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-26/","reference_id":"mfsa2024-26","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-26/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-28","reference_id":"mfsa2024-28","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-28"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-28/","reference_id":"mfsa2024-28","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-28/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html","reference_id":"msg00000.html","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html","reference_id":"msg00010.html","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3949","reference_id":"RHSA-2024:3949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3950","reference_id":"RHSA-2024:3950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3951","reference_id":"RHSA-2024:3951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3952","reference_id":"RHSA-2024:3952","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3952"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3953","reference_id":"RHSA-2024:3953","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3953"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3954","reference_id":"RHSA-2024:3954","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3955","reference_id":"RHSA-2024:3955","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3955"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3958","reference_id":"RHSA-2024:3958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3972","reference_id":"RHSA-2024:3972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4001","reference_id":"RHSA-2024:4001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4002","reference_id":"RHSA-2024:4002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4003","reference_id":"RHSA-2024:4003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4004","reference_id":"RHSA-2024:4004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4015","reference_id":"RHSA-2024:4015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4016","reference_id":"RHSA-2024:4016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4018","reference_id":"RHSA-2024:4018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4036","reference_id":"RHSA-2024:4036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4063","reference_id":"RHSA-2024:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4063"},{"reference_url":"https://usn.ubuntu.com/6840-1/","reference_id":"USN-6840-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6840-1/"},{"reference_url":"https://usn.ubuntu.com/6862-1/","reference_id":"USN-6862-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6862-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-5700"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bshu-jxhj-27b8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50615?format=json","vulnerability_id":"VCID-ecs2-1xkw-wkga","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3855","reference_id":"","reference_type":"","scores":[{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37214","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37326","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37236","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37119","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37186","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37205","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37125","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37097","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37175","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37193","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37652","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37665","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37679","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37645","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37617","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37664","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37646","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37582","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37346","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43974","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43926","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43996","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3855"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-18/","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T15:34:26Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-18/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1885828","reference_id":"show_bug.cgi?id=1885828","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T15:34:26Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1885828"},{"reference_url":"https://usn.ubuntu.com/6747-1/","reference_id":"USN-6747-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6747-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-3855"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ecs2-1xkw-wkga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36100?format=json","vulnerability_id":"VCID-gpjz-649k-f3he","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5696.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5696.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5696","reference_id":"","reference_type":"","scores":[{"value":"0.02069","scoring_system":"epss","scoring_elements":"0.84131","published_at":"2026-05-16T12:55:00Z"},{"value":"0.02069","scoring_system":"epss","scoring_elements":"0.83953","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02069","scoring_system":"epss","scoring_elements":"0.83947","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02069","scoring_system":"epss","scoring_elements":"0.83943","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02069","scoring_system":"epss","scoring_elements":"0.83967","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02069","scoring_system":"epss","scoring_elements":"0.83969","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02069","scoring_system":"epss","scoring_elements":"0.83995","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02069","scoring_system":"epss","scoring_elements":"0.84003","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02069","scoring_system":"epss","scoring_elements":"0.84008","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02069","scoring_system":"epss","scoring_elements":"0.84028","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02069","scoring_system":"epss","scoring_elements":"0.84051","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02069","scoring_system":"epss","scoring_elements":"0.84067","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02069","scoring_system":"epss","scoring_elements":"0.84066","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02069","scoring_system":"epss","scoring_elements":"0.84084","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02069","scoring_system":"epss","scoring_elements":"0.84117","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02069","scoring_system":"epss","scoring_elements":"0.84128","published_at":"2026-05-15T12:55:00Z"},{"value":"0.02069","scoring_system":"epss","scoring_elements":"0.83888","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02069","scoring_system":"epss","scoring_elements":"0.83904","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02069","scoring_system":"epss","scoring_elements":"0.83907","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02069","scoring_system":"epss","scoring_elements":"0.8393","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02069","scoring_system":"epss","scoring_elements":"0.83937","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2291400","reference_id":"2291400","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2291400"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202412-13","reference_id":"GLSA-202412-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-25","reference_id":"mfsa2024-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-25"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-25/","reference_id":"mfsa2024-25","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-25/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-26","reference_id":"mfsa2024-26","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-26"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-26/","reference_id":"mfsa2024-26","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-26/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-28","reference_id":"mfsa2024-28","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-28"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-28/","reference_id":"mfsa2024-28","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-28/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html","reference_id":"msg00000.html","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html","reference_id":"msg00010.html","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3949","reference_id":"RHSA-2024:3949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3950","reference_id":"RHSA-2024:3950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3951","reference_id":"RHSA-2024:3951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3952","reference_id":"RHSA-2024:3952","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3952"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3953","reference_id":"RHSA-2024:3953","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3953"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3954","reference_id":"RHSA-2024:3954","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3955","reference_id":"RHSA-2024:3955","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3955"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3958","reference_id":"RHSA-2024:3958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3972","reference_id":"RHSA-2024:3972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4001","reference_id":"RHSA-2024:4001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4002","reference_id":"RHSA-2024:4002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4003","reference_id":"RHSA-2024:4003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4004","reference_id":"RHSA-2024:4004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4015","reference_id":"RHSA-2024:4015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4016","reference_id":"RHSA-2024:4016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4018","reference_id":"RHSA-2024:4018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4036","reference_id":"RHSA-2024:4036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4063","reference_id":"RHSA-2024:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4063"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1896555","reference_id":"show_bug.cgi?id=1896555","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1896555"},{"reference_url":"https://usn.ubuntu.com/6840-1/","reference_id":"USN-6840-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6840-1/"},{"reference_url":"https://usn.ubuntu.com/6862-1/","reference_id":"USN-6862-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6862-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-5696"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gpjz-649k-f3he"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47589?format=json","vulnerability_id":"VCID-h5ub-djvf-nffv","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3302.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3302.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3302","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26486","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26695","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26746","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2675","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26706","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26649","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26657","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26629","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26592","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26533","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26526","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26454","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26322","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26391","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26446","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26373","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2639","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26469","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26494","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26803","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26843","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26628","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273383","reference_id":"2273383","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273383"},{"reference_url":"https://kb.cert.org/vuls/id/421644","reference_id":"421644","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T14:53:12Z/"}],"url":"https://kb.cert.org/vuls/id/421644"},{"reference_url":"https://security.gentoo.org/glsa/202405-32","reference_id":"GLSA-202405-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-32"},{"reference_url":"https://security.gentoo.org/glsa/202407-19","reference_id":"GLSA-202407-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-19"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-18/","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T14:53:12Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-18/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-19","reference_id":"mfsa2024-19","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-19"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-19/","reference_id":"mfsa2024-19","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T14:53:12Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-19/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-20","reference_id":"mfsa2024-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-20"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-20/","reference_id":"mfsa2024-20","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T14:53:12Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-20/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html","reference_id":"msg00012.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T14:53:12Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html","reference_id":"msg00013.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T14:53:12Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1904","reference_id":"RHSA-2024:1904","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1904"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1905","reference_id":"RHSA-2024:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1906","reference_id":"RHSA-2024:1906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1907","reference_id":"RHSA-2024:1907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1908","reference_id":"RHSA-2024:1908","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1908"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1909","reference_id":"RHSA-2024:1909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1910","reference_id":"RHSA-2024:1910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1911","reference_id":"RHSA-2024:1911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1912","reference_id":"RHSA-2024:1912","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1912"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1934","reference_id":"RHSA-2024:1934","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1934"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1935","reference_id":"RHSA-2024:1935","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1935"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1936","reference_id":"RHSA-2024:1936","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1936"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1937","reference_id":"RHSA-2024:1937","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1937"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1938","reference_id":"RHSA-2024:1938","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1938"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1939","reference_id":"RHSA-2024:1939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1940","reference_id":"RHSA-2024:1940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1941","reference_id":"RHSA-2024:1941","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1982","reference_id":"RHSA-2024:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1982"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1881183","reference_id":"show_bug.cgi?id=1881183","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T14:53:12Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1881183"},{"reference_url":"https://usn.ubuntu.com/6747-1/","reference_id":"USN-6747-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6747-1/"},{"reference_url":"https://usn.ubuntu.com/6750-1/","reference_id":"USN-6750-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6750-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-3302"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h5ub-djvf-nffv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50625?format=json","vulnerability_id":"VCID-hehb-ttkd-nbb6","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4772","reference_id":"","reference_type":"","scores":[{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18262","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18061","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18163","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18126","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18154","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18244","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18252","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18481","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18535","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18245","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18328","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18381","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18332","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1828","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18224","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18236","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18263","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18162","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18145","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18109","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17971","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4772"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-21","reference_id":"mfsa2024-21","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-21"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-21/","reference_id":"mfsa2024-21","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:24:50Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-21/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1870579","reference_id":"show_bug.cgi?id=1870579","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:24:50Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1870579"},{"reference_url":"https://usn.ubuntu.com/6779-1/","reference_id":"USN-6779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6779-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-4772"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hehb-ttkd-nbb6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50635?format=json","vulnerability_id":"VCID-jced-kyws-kuck","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5698","reference_id":"","reference_type":"","scores":[{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.61066","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60933","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60992","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60981","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.61038","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.61052","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.6086","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60889","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60853","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60902","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60918","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.6094","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60926","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60907","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60949","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60955","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60939","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.6093","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60943","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60936","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60884","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5698"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-25","reference_id":"mfsa2024-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-25"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-25/","reference_id":"mfsa2024-25","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:40:09Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-25/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1828259","reference_id":"show_bug.cgi?id=1828259","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:40:09Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1828259"},{"reference_url":"https://usn.ubuntu.com/6862-1/","reference_id":"USN-6862-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6862-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-5698"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jced-kyws-kuck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50624?format=json","vulnerability_id":"VCID-kavx-hnua-aff7","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4771","reference_id":"","reference_type":"","scores":[{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70361","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70256","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70289","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70259","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70286","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70336","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70346","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70099","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70114","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70091","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70138","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70154","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70178","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70163","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70151","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70194","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70203","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70182","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70233","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.7024","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70239","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70214","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4771"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-21","reference_id":"mfsa2024-21","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-21"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-21/","reference_id":"mfsa2024-21","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-15T15:40:13Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-21/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1893891","reference_id":"show_bug.cgi?id=1893891","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-15T15:40:13Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1893891"},{"reference_url":"https://usn.ubuntu.com/6779-1/","reference_id":"USN-6779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6779-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-4771"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kavx-hnua-aff7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47590?format=json","vulnerability_id":"VCID-ku26-71r1-vfem","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3854.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3854.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3854","reference_id":"","reference_type":"","scores":[{"value":"0.00928","scoring_system":"epss","scoring_elements":"0.76295","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00928","scoring_system":"epss","scoring_elements":"0.76287","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00928","scoring_system":"epss","scoring_elements":"0.76274","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00928","scoring_system":"epss","scoring_elements":"0.76225","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00928","scoring_system":"epss","scoring_elements":"0.7621","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00928","scoring_system":"epss","scoring_elements":"0.76223","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00928","scoring_system":"epss","scoring_elements":"0.76201","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00928","scoring_system":"epss","scoring_elements":"0.76171","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00928","scoring_system":"epss","scoring_elements":"0.76162","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00928","scoring_system":"epss","scoring_elements":"0.7615","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00928","scoring_system":"epss","scoring_elements":"0.76101","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00928","scoring_system":"epss","scoring_elements":"0.7614","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77014","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77004","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77033","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77046","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77056","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77085","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77065","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.7706","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.771","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77102","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275549","reference_id":"2275549","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275549"},{"reference_url":"https://security.gentoo.org/glsa/202405-32","reference_id":"GLSA-202405-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-32"},{"reference_url":"https://security.gentoo.org/glsa/202407-19","reference_id":"GLSA-202407-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-19"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-18/","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T15:00:10Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-18/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-19","reference_id":"mfsa2024-19","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-19"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-19/","reference_id":"mfsa2024-19","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T15:00:10Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-19/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-20","reference_id":"mfsa2024-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-20"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-20/","reference_id":"mfsa2024-20","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T15:00:10Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-20/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html","reference_id":"msg00012.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T15:00:10Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html","reference_id":"msg00013.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T15:00:10Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1904","reference_id":"RHSA-2024:1904","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1904"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1905","reference_id":"RHSA-2024:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1906","reference_id":"RHSA-2024:1906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1907","reference_id":"RHSA-2024:1907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1908","reference_id":"RHSA-2024:1908","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1908"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1909","reference_id":"RHSA-2024:1909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1910","reference_id":"RHSA-2024:1910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1911","reference_id":"RHSA-2024:1911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1912","reference_id":"RHSA-2024:1912","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1912"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1934","reference_id":"RHSA-2024:1934","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1934"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1935","reference_id":"RHSA-2024:1935","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1935"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1936","reference_id":"RHSA-2024:1936","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1936"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1937","reference_id":"RHSA-2024:1937","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1937"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1938","reference_id":"RHSA-2024:1938","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1938"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1939","reference_id":"RHSA-2024:1939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1940","reference_id":"RHSA-2024:1940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1941","reference_id":"RHSA-2024:1941","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1982","reference_id":"RHSA-2024:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1982"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1884552","reference_id":"show_bug.cgi?id=1884552","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T15:00:10Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1884552"},{"reference_url":"https://usn.ubuntu.com/6747-1/","reference_id":"USN-6747-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6747-1/"},{"reference_url":"https://usn.ubuntu.com/6750-1/","reference_id":"USN-6750-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6750-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-3854"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ku26-71r1-vfem"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47592?format=json","vulnerability_id":"VCID-mfs8-2vzs-pybf","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3859.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3859.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3859","reference_id":"","reference_type":"","scores":[{"value":"0.01586","scoring_system":"epss","scoring_elements":"0.81674","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01586","scoring_system":"epss","scoring_elements":"0.8165","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01586","scoring_system":"epss","scoring_elements":"0.81688","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01586","scoring_system":"epss","scoring_elements":"0.81683","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82388","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82381","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82354","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.8234","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82358","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82433","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82398","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82404","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82407","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02136","scoring_system":"epss","scoring_elements":"0.8438","published_at":"2026-05-16T12:55:00Z"},{"value":"0.02136","scoring_system":"epss","scoring_elements":"0.84277","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02136","scoring_system":"epss","scoring_elements":"0.84303","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02136","scoring_system":"epss","scoring_elements":"0.84319","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02136","scoring_system":"epss","scoring_elements":"0.84318","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02136","scoring_system":"epss","scoring_elements":"0.84335","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02136","scoring_system":"epss","scoring_elements":"0.84367","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02136","scoring_system":"epss","scoring_elements":"0.84377","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275552","reference_id":"2275552","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275552"},{"reference_url":"https://security.gentoo.org/glsa/202405-32","reference_id":"GLSA-202405-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-32"},{"reference_url":"https://security.gentoo.org/glsa/202407-19","reference_id":"GLSA-202407-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-19"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-18/","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T23:44:58Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-18/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-19","reference_id":"mfsa2024-19","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-19"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-19/","reference_id":"mfsa2024-19","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T23:44:58Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-19/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-20","reference_id":"mfsa2024-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-20"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-20/","reference_id":"mfsa2024-20","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T23:44:58Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-20/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html","reference_id":"msg00012.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T23:44:58Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html","reference_id":"msg00013.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T23:44:58Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1904","reference_id":"RHSA-2024:1904","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1904"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1905","reference_id":"RHSA-2024:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1906","reference_id":"RHSA-2024:1906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1907","reference_id":"RHSA-2024:1907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1908","reference_id":"RHSA-2024:1908","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1908"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1909","reference_id":"RHSA-2024:1909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1910","reference_id":"RHSA-2024:1910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1911","reference_id":"RHSA-2024:1911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1912","reference_id":"RHSA-2024:1912","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1912"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1934","reference_id":"RHSA-2024:1934","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1934"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1935","reference_id":"RHSA-2024:1935","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1935"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1936","reference_id":"RHSA-2024:1936","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1936"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1937","reference_id":"RHSA-2024:1937","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1937"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1938","reference_id":"RHSA-2024:1938","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1938"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1939","reference_id":"RHSA-2024:1939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1940","reference_id":"RHSA-2024:1940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1941","reference_id":"RHSA-2024:1941","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1982","reference_id":"RHSA-2024:1982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1982"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1874489","reference_id":"show_bug.cgi?id=1874489","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T23:44:58Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1874489"},{"reference_url":"https://usn.ubuntu.com/6747-1/","reference_id":"USN-6747-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6747-1/"},{"reference_url":"https://usn.ubuntu.com/6750-1/","reference_id":"USN-6750-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6750-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-3859"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mfs8-2vzs-pybf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50626?format=json","vulnerability_id":"VCID-mm2u-njbv-ckfb","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4773","reference_id":"","reference_type":"","scores":[{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52956","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52969","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52961","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52924","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.5294","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52867","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52894","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52862","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52913","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52906","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59984","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59911","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59868","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59894","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59959","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59969","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59867","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59838","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59856","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59841","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59804","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59852","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4773"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-21","reference_id":"mfsa2024-21","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-21"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-21/","reference_id":"mfsa2024-21","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-15T14:13:57Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-21/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1875248","reference_id":"show_bug.cgi?id=1875248","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-15T14:13:57Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1875248"},{"reference_url":"https://usn.ubuntu.com/6779-1/","reference_id":"USN-6779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6779-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-4773"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mm2u-njbv-ckfb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50634?format=json","vulnerability_id":"VCID-nce4-3put-j3ex","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5697","reference_id":"","reference_type":"","scores":[{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63284","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63218","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63179","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63205","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.6326","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.6327","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63055","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63084","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63049","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.631","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63117","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63134","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.6312","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63097","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63133","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63141","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63121","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63143","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63157","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63156","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63123","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63167","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5697"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-25","reference_id":"mfsa2024-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-25"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-25/","reference_id":"mfsa2024-25","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-13T14:00:20Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-25/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414937","reference_id":"show_bug.cgi?id=1414937","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-13T14:00:20Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414937"},{"reference_url":"https://usn.ubuntu.com/6862-1/","reference_id":"USN-6862-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6862-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-5697"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nce4-3put-j3ex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50631?format=json","vulnerability_id":"VCID-p44n-ajkd-v7af","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5689","reference_id":"","reference_type":"","scores":[{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.72054","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71891","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71896","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71879","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71925","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71929","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71926","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71916","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71952","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71982","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71946","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71975","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.72033","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.72041","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00776","scoring_system":"epss","scoring_elements":"0.73621","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00776","scoring_system":"epss","scoring_elements":"0.73616","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00776","scoring_system":"epss","scoring_elements":"0.73625","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00776","scoring_system":"epss","scoring_elements":"0.73643","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00776","scoring_system":"epss","scoring_elements":"0.73575","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00776","scoring_system":"epss","scoring_elements":"0.73599","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00776","scoring_system":"epss","scoring_elements":"0.73571","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00776","scoring_system":"epss","scoring_elements":"0.73608","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5689"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-25","reference_id":"mfsa2024-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-25"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-25/","reference_id":"mfsa2024-25","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:35Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-25/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1389707","reference_id":"show_bug.cgi?id=1389707","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:35Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1389707"},{"reference_url":"https://usn.ubuntu.com/6862-1/","reference_id":"USN-6862-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6862-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-5689"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p44n-ajkd-v7af"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50620?format=json","vulnerability_id":"VCID-rpnz-nsfq-97am","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3865","reference_id":"","reference_type":"","scores":[{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51285","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51112","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51163","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51205","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51162","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51192","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.5128","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51187","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51213","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.5117","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51225","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51222","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51266","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51244","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.5123","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51269","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51276","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51253","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51202","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51209","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51171","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3865"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1881076%2C1884887%2C1885359%2C1889049","reference_id":"buglist.cgi?bug_id=1881076%2C1884887%2C1885359%2C1889049","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:48:47Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1881076%2C1884887%2C1885359%2C1889049"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-18/","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:48:47Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-18/"},{"reference_url":"https://usn.ubuntu.com/6747-1/","reference_id":"USN-6747-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6747-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-3865"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rpnz-nsfq-97am"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50614?format=json","vulnerability_id":"VCID-s1mx-dkf3-p7f7","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3853","reference_id":"","reference_type":"","scores":[{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25735","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25634","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25693","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25622","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25639","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25717","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25743","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25988","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25801","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25872","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25923","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25933","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25891","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25837","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2584","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25821","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25792","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25729","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25681","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25568","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3853"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-18/","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:40:35Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-18/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1884427","reference_id":"show_bug.cgi?id=1884427","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:40:35Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1884427"},{"reference_url":"https://usn.ubuntu.com/6747-1/","reference_id":"USN-6747-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6747-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-3853"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s1mx-dkf3-p7f7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50628?format=json","vulnerability_id":"VCID-s3cz-gvd7-kkcc","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4775","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20162","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20067","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20037","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20061","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20151","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20152","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20313","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20372","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20095","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20176","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20235","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20259","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20214","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20154","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20146","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2015","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20149","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2003","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20025","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19995","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19904","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19981","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4775"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-21","reference_id":"mfsa2024-21","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-21"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-21/","reference_id":"mfsa2024-21","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-15T15:07:39Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-21/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1887332","reference_id":"show_bug.cgi?id=1887332","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-15T15:07:39Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1887332"},{"reference_url":"https://usn.ubuntu.com/6779-1/","reference_id":"USN-6779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6779-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-4775"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s3cz-gvd7-kkcc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50637?format=json","vulnerability_id":"VCID-t3h9-4h4u-3bgx","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5701","reference_id":"","reference_type":"","scores":[{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71456","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71388","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71351","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71379","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71434","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71444","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71196","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71214","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71189","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71231","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71245","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71268","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71253","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71237","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71283","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7129","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71267","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7132","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71327","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71331","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71317","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71353","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5701"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1890909%2C1891422%2C1893915%2C1894047%2C1896024","reference_id":"buglist.cgi?bug_id=1890909%2C1891422%2C1893915%2C1894047%2C1896024","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:43Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1890909%2C1891422%2C1893915%2C1894047%2C1896024"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-25","reference_id":"mfsa2024-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-25"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-25/","reference_id":"mfsa2024-25","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:43Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-25/"},{"reference_url":"https://usn.ubuntu.com/6862-1/","reference_id":"USN-6862-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6862-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-5701"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t3h9-4h4u-3bgx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50638?format=json","vulnerability_id":"VCID-u9pc-4b61-gkeg","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5702.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5702.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5702","reference_id":"","reference_type":"","scores":[{"value":"0.00735","scoring_system":"epss","scoring_elements":"0.7288","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00735","scoring_system":"epss","scoring_elements":"0.72883","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00735","scoring_system":"epss","scoring_elements":"0.72874","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00735","scoring_system":"epss","scoring_elements":"0.72833","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00735","scoring_system":"epss","scoring_elements":"0.72841","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00735","scoring_system":"epss","scoring_elements":"0.7283","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00735","scoring_system":"epss","scoring_elements":"0.72787","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00735","scoring_system":"epss","scoring_elements":"0.72796","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00735","scoring_system":"epss","scoring_elements":"0.72813","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00735","scoring_system":"epss","scoring_elements":"0.72788","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00735","scoring_system":"epss","scoring_elements":"0.72775","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00735","scoring_system":"epss","scoring_elements":"0.72736","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00735","scoring_system":"epss","scoring_elements":"0.72742","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00735","scoring_system":"epss","scoring_elements":"0.72761","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77918","published_at":"2026-05-16T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77827","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77845","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77834","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77852","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77897","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77911","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2291394","reference_id":"2291394","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2291394"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-18/","reference_id":"mfsa2024-18","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:00:39Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-18/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-26","reference_id":"mfsa2024-26","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-26"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-26/","reference_id":"mfsa2024-26","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:00:39Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-26/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-28","reference_id":"mfsa2024-28","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-28"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-28/","reference_id":"mfsa2024-28","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:00:39Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-28/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html","reference_id":"msg00000.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:00:39Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html","reference_id":"msg00010.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:00:39Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3949","reference_id":"RHSA-2024:3949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3950","reference_id":"RHSA-2024:3950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3951","reference_id":"RHSA-2024:3951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3952","reference_id":"RHSA-2024:3952","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3952"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3953","reference_id":"RHSA-2024:3953","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3953"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3954","reference_id":"RHSA-2024:3954","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3955","reference_id":"RHSA-2024:3955","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3955"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3958","reference_id":"RHSA-2024:3958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3972","reference_id":"RHSA-2024:3972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4001","reference_id":"RHSA-2024:4001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4002","reference_id":"RHSA-2024:4002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4003","reference_id":"RHSA-2024:4003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4004","reference_id":"RHSA-2024:4004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4015","reference_id":"RHSA-2024:4015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4016","reference_id":"RHSA-2024:4016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4018","reference_id":"RHSA-2024:4018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4036","reference_id":"RHSA-2024:4036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4063","reference_id":"RHSA-2024:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4063"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1193389","reference_id":"show_bug.cgi?id=1193389","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:00:39Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1193389"},{"reference_url":"https://usn.ubuntu.com/6840-1/","reference_id":"USN-6840-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6840-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-5702"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u9pc-4b61-gkeg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50629?format=json","vulnerability_id":"VCID-vfsu-6m2n-rkfy","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4776","reference_id":"","reference_type":"","scores":[{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.6989","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.6982","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.6979","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69816","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69866","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69876","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69618","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69634","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69612","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69663","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69681","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69687","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69674","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69715","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69723","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69704","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69757","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69765","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69771","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69745","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69789","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4776"},{"reference_url":"https://security.gentoo.org/glsa/202408-02","reference_id":"GLSA-202408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-21","reference_id":"mfsa2024-21","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-21"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-21/","reference_id":"mfsa2024-21","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-15T14:16:16Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-21/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1887343","reference_id":"show_bug.cgi?id=1887343","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-15T14:16:16Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1887343"},{"reference_url":"https://usn.ubuntu.com/6779-1/","reference_id":"USN-6779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6779-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78888?format=json","purl":"pkg:ebuild/www-client/firefox@115.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@115.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78889?format=json","purl":"pkg:ebuild/www-client/firefox@127.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}],"aliases":["CVE-2024-4776"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vfsu-6m2n-rkfy"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@127.0"}