{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","type":"ebuild","namespace":"www-client","name":"firefox-bin","version":"121.0","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"122.0","latest_non_vulnerable_version":"137.0.1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61498?format=json","vulnerability_id":"VCID-2j1e-fjx6-tucr","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6872","reference_id":"","reference_type":"","scores":[{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.4834","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48442","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.4852","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48478","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48476","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48423","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48464","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48416","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48471","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48465","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48488","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48462","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48475","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48525","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6872"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-56/","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-21T20:34:05Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-56/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1849186","reference_id":"show_bug.cgi?id=1849186","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-21T20:34:05Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1849186"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-6872"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2j1e-fjx6-tucr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61511?format=json","vulnerability_id":"VCID-3d1e-hqg2-zbbm","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37210","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32609","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32692","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.33898","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38909","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38962","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38976","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38987","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38958","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38978","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.3897","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38951","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38868","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38705","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.3895","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38923","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37210"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-22/","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:25:23Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-22/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1821886","reference_id":"show_bug.cgi?id=1821886","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:25:23Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1821886"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-37210"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3d1e-hqg2-zbbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61487?format=json","vulnerability_id":"VCID-3nrj-5r53-37ab","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6135.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6135.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6135","reference_id":"","reference_type":"","scores":[{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.36019","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35527","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35616","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35647","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.3605","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35881","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35932","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35955","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35961","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35922","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35898","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35938","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35925","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41241","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6135"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059054","reference_id":"1059054","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059054"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2249906","reference_id":"2249906","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2249906"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-56/","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:59:00Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-56/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0785","reference_id":"RHSA-2024:0785","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0786","reference_id":"RHSA-2024:0786","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0786"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0790","reference_id":"RHSA-2024:0790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0791","reference_id":"RHSA-2024:0791","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0791"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1686","reference_id":"RHSA-2024:1686","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1686"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6782","reference_id":"RHSA-2024:6782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6786","reference_id":"RHSA-2024:6786","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6786"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6839","reference_id":"RHSA-2024:6839","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6850","reference_id":"RHSA-2024:6850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6850"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1853908","reference_id":"show_bug.cgi?id=1853908","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:59:00Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1853908"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6727-1/","reference_id":"USN-6727-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6727-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-6135"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3nrj-5r53-37ab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46028?format=json","vulnerability_id":"VCID-43dj-vtap-2qd2","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32206.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32206.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32206","reference_id":"","reference_type":"","scores":[{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.3452","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.3465","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34741","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34991","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.3476","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42324","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42296","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42346","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42322","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42361","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42308","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42337","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42279","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.4233","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42338","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196737","reference_id":"2196737","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196737"},{"reference_url":"https://security.gentoo.org/glsa/202312-03","reference_id":"GLSA-202312-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202312-03"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16","reference_id":"mfsa2023-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-17","reference_id":"mfsa2023-17","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-17"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-18","reference_id":"mfsa2023-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3137","reference_id":"RHSA-2023:3137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3138","reference_id":"RHSA-2023:3138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3139","reference_id":"RHSA-2023:3139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3139"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3140","reference_id":"RHSA-2023:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3141","reference_id":"RHSA-2023:3141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3142","reference_id":"RHSA-2023:3142","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3142"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3143","reference_id":"RHSA-2023:3143","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3143"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3149","reference_id":"RHSA-2023:3149","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3150","reference_id":"RHSA-2023:3150","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3150"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3151","reference_id":"RHSA-2023:3151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3152","reference_id":"RHSA-2023:3152","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3152"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3153","reference_id":"RHSA-2023:3153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3154","reference_id":"RHSA-2023:3154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3154"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3155","reference_id":"RHSA-2023:3155","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3155"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3220","reference_id":"RHSA-2023:3220","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3220"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3221","reference_id":"RHSA-2023:3221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3221"},{"reference_url":"https://usn.ubuntu.com/6074-1/","reference_id":"USN-6074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6074-1/"},{"reference_url":"https://usn.ubuntu.com/6075-1/","reference_id":"USN-6075-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6075-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-32206"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-43dj-vtap-2qd2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61493?format=json","vulnerability_id":"VCID-4g3s-bh4t-qqhc","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6867.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6867.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6867","reference_id":"","reference_type":"","scores":[{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.75059","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.75021","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.75074","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.75067","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00857","scoring_system":"epss","scoring_elements":"0.75064","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.76093","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.76048","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.7608","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.7606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.76107","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.76132","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.76108","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.76106","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.76147","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00931","scoring_system":"epss","scoring_elements":"0.7615","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255366","reference_id":"2255366","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255366"},{"reference_url":"https://www.debian.org/security/2023/dsa-5581","reference_id":"dsa-5581","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/"}],"url":"https://www.debian.org/security/2023/dsa-5581"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-54/","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-54/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-56/","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-56/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html","reference_id":"msg00020.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1863863","reference_id":"show_bug.cgi?id=1863863","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T18:50:04Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1863863"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-6867"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4g3s-bh4t-qqhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61496?format=json","vulnerability_id":"VCID-4urd-zjpu-47ed","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6870","reference_id":"","reference_type":"","scores":[{"value":"0.00603","scoring_system":"epss","scoring_elements":"0.69624","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00603","scoring_system":"epss","scoring_elements":"0.69584","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00603","scoring_system":"epss","scoring_elements":"0.69637","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00603","scoring_system":"epss","scoring_elements":"0.69644","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00603","scoring_system":"epss","scoring_elements":"0.69648","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71473","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71496","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71507","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71512","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.7148","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71428","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71446","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71421","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71461","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6870"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-6870"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4urd-zjpu-47ed"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61499?format=json","vulnerability_id":"VCID-4xqc-2rzu-y3aj","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6873","reference_id":"","reference_type":"","scores":[{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59659","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59651","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59676","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59646","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59697","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59711","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.5973","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59714","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59695","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59729","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59736","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59721","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59691","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.5971","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-6873"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4xqc-2rzu-y3aj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46034?format=json","vulnerability_id":"VCID-4z8m-8jr8-pqh6","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32212.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32212.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32212","reference_id":"","reference_type":"","scores":[{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41298","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41406","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41077","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41292","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41951","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41997","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42025","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42001","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42012","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42034","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41983","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42031","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42005","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196741","reference_id":"2196741","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196741"},{"reference_url":"https://security.gentoo.org/glsa/202312-03","reference_id":"GLSA-202312-03","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:21:37Z/"}],"url":"https://security.gentoo.org/glsa/202312-03"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16","reference_id":"mfsa2023-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-16/","reference_id":"mfsa2023-16","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:21:37Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-16/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-17","reference_id":"mfsa2023-17","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-17"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-17/","reference_id":"mfsa2023-17","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:21:37Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-17/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-18","reference_id":"mfsa2023-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-18/","reference_id":"mfsa2023-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:21:37Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-18/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3137","reference_id":"RHSA-2023:3137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3138","reference_id":"RHSA-2023:3138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3139","reference_id":"RHSA-2023:3139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3139"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3140","reference_id":"RHSA-2023:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3141","reference_id":"RHSA-2023:3141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3142","reference_id":"RHSA-2023:3142","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3142"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3143","reference_id":"RHSA-2023:3143","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3143"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3149","reference_id":"RHSA-2023:3149","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3150","reference_id":"RHSA-2023:3150","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3150"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3151","reference_id":"RHSA-2023:3151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3152","reference_id":"RHSA-2023:3152","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3152"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3153","reference_id":"RHSA-2023:3153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3154","reference_id":"RHSA-2023:3154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3154"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3155","reference_id":"RHSA-2023:3155","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3155"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3220","reference_id":"RHSA-2023:3220","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3220"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3221","reference_id":"RHSA-2023:3221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3221"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1826622","reference_id":"show_bug.cgi?id=1826622","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:21:37Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1826622"},{"reference_url":"https://usn.ubuntu.com/6074-1/","reference_id":"USN-6074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6074-1/"},{"reference_url":"https://usn.ubuntu.com/6075-1/","reference_id":"USN-6075-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6075-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-32212"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4z8m-8jr8-pqh6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51437?format=json","vulnerability_id":"VCID-5qf5-d44c-t7gu","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6862.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6862.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6862","reference_id":"","reference_type":"","scores":[{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.5868","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58615","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58675","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58643","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58663","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58682","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58664","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58658","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58636","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63263","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63264","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63283","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63297","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63295","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255368","reference_id":"2255368","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255368"},{"reference_url":"https://www.debian.org/security/2023/dsa-5581","reference_id":"dsa-5581","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/"}],"url":"https://www.debian.org/security/2023/dsa-5581"},{"reference_url":"https://www.debian.org/security/2023/dsa-5582","reference_id":"dsa-5582","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/"}],"url":"https://www.debian.org/security/2023/dsa-5582"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-54/","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-54/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-55/","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-55/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html","reference_id":"msg00020.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1868042","reference_id":"show_bug.cgi?id=1868042","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1868042"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-6862"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5qf5-d44c-t7gu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46024?format=json","vulnerability_id":"VCID-697p-cpq8-1qax","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32205.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32205.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32205","reference_id":"","reference_type":"","scores":[{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41292","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41077","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41406","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41298","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41983","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42031","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42005","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42034","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41997","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42025","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41951","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42001","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42012","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196736","reference_id":"2196736","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196736"},{"reference_url":"https://security.gentoo.org/glsa/202312-03","reference_id":"GLSA-202312-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202312-03"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16","reference_id":"mfsa2023-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-17","reference_id":"mfsa2023-17","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-17"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-18","reference_id":"mfsa2023-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3137","reference_id":"RHSA-2023:3137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3138","reference_id":"RHSA-2023:3138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3139","reference_id":"RHSA-2023:3139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3139"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3140","reference_id":"RHSA-2023:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3141","reference_id":"RHSA-2023:3141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3142","reference_id":"RHSA-2023:3142","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3142"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3143","reference_id":"RHSA-2023:3143","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3143"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3149","reference_id":"RHSA-2023:3149","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3150","reference_id":"RHSA-2023:3150","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3150"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3151","reference_id":"RHSA-2023:3151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3152","reference_id":"RHSA-2023:3152","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3152"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3153","reference_id":"RHSA-2023:3153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3154","reference_id":"RHSA-2023:3154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3154"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3155","reference_id":"RHSA-2023:3155","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3155"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3220","reference_id":"RHSA-2023:3220","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3220"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3221","reference_id":"RHSA-2023:3221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3221"},{"reference_url":"https://usn.ubuntu.com/6074-1/","reference_id":"USN-6074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6074-1/"},{"reference_url":"https://usn.ubuntu.com/6075-1/","reference_id":"USN-6075-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6075-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-32205"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-697p-cpq8-1qax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61483?format=json","vulnerability_id":"VCID-6q8f-csj4-vkhb","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5723","reference_id":"","reference_type":"","scores":[{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37253","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37461","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37371","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44303","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44354","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4436","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44377","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.444","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44391","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4432","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44233","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44345","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44344","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44366","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5723"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-45","reference_id":"mfsa2023-45","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-45"},{"reference_url":"https://usn.ubuntu.com/6456-1/","reference_id":"USN-6456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-5723"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6q8f-csj4-vkhb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61475?format=json","vulnerability_id":"VCID-7hye-1c3x-cubf","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4058","reference_id":"","reference_type":"","scores":[{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52573","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52669","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52629","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53823","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53875","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53873","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53921","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53903","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53925","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53931","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53912","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53879","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53887","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53822","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53849","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4058"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29"},{"reference_url":"https://usn.ubuntu.com/6267-1/","reference_id":"USN-6267-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6267-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-4058"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7hye-1c3x-cubf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61504?format=json","vulnerability_id":"VCID-8243-6pew-wuaj","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34415","reference_id":"","reference_type":"","scores":[{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24659","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24535","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24702","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28582","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28647","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28688","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28689","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28598","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28645","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28727","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28774","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29755","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29711","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29632","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29777","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34415"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-20","reference_id":"mfsa2023-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-20"},{"reference_url":"https://usn.ubuntu.com/6143-1/","reference_id":"USN-6143-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6143-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-34415"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8243-6pew-wuaj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61481?format=json","vulnerability_id":"VCID-8h3r-nznt-jff7","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5175","reference_id":"","reference_type":"","scores":[{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57491","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57512","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57442","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58556","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58514","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58563","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58579","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58559","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58539","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58574","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58578","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58524","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58534","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58504","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5175"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-41","reference_id":"mfsa2023-41","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-41"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-41/","reference_id":"mfsa2023-41","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:03Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-41/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1849704","reference_id":"show_bug.cgi?id=1849704","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:03Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1849704"},{"reference_url":"https://usn.ubuntu.com/6404-1/","reference_id":"USN-6404-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6404-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-5175"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8h3r-nznt-jff7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61512?format=json","vulnerability_id":"VCID-8r1a-6vz3-r3a9","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37212","reference_id":"","reference_type":"","scores":[{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46864","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46814","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48552","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54184","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54237","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54233","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54282","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54243","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54286","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54229","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54265","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54179","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54209","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37212"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-37212"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8r1a-6vz3-r3a9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61491?format=json","vulnerability_id":"VCID-9saf-1zax-5ycy","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6865.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6865.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6865","reference_id":"","reference_type":"","scores":[{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61512","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61562","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61565","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61552","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61568","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71637","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71602","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71647","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71652","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71621","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71572","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.7159","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71563","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71603","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71614","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255361","reference_id":"2255361","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255361"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-6865"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9saf-1zax-5ycy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46041?format=json","vulnerability_id":"VCID-9the-k9nt-4bdg","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34416.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34416.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34416","reference_id":"","reference_type":"","scores":[{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49222","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49204","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49195","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49174","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49202","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49153","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49208","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5106","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51067","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53497","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53604","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53567","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53579","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53542","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34416"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2212842","reference_id":"2212842","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2212842"},{"reference_url":"https://security.gentoo.org/glsa/202312-03","reference_id":"GLSA-202312-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202312-03"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-19","reference_id":"mfsa2023-19","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-19"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-20","reference_id":"mfsa2023-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-20"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-21","reference_id":"mfsa2023-21","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3560","reference_id":"RHSA-2023:3560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3561","reference_id":"RHSA-2023:3561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3562","reference_id":"RHSA-2023:3562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3563","reference_id":"RHSA-2023:3563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3564","reference_id":"RHSA-2023:3564","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3564"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3565","reference_id":"RHSA-2023:3565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3566","reference_id":"RHSA-2023:3566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3567","reference_id":"RHSA-2023:3567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3567"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3578","reference_id":"RHSA-2023:3578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3579","reference_id":"RHSA-2023:3579","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3579"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3587","reference_id":"RHSA-2023:3587","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3587"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3588","reference_id":"RHSA-2023:3588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3589","reference_id":"RHSA-2023:3589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3590","reference_id":"RHSA-2023:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3596","reference_id":"RHSA-2023:3596","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3596"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3597","reference_id":"RHSA-2023:3597","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3597"},{"reference_url":"https://usn.ubuntu.com/6143-1/","reference_id":"USN-6143-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6143-1/"},{"reference_url":"https://usn.ubuntu.com/6147-1/","reference_id":"USN-6147-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6147-1/"},{"reference_url":"https://usn.ubuntu.com/6214-1/","reference_id":"USN-6214-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6214-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-34416"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9the-k9nt-4bdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51434?format=json","vulnerability_id":"VCID-9z3s-qfbc-vbdc","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6859.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6859.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6859","reference_id":"","reference_type":"","scores":[{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59175","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59159","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.6157","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61515","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61565","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63608","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63645","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63654","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63656","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63583","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63609","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63573","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63625","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63641","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255364","reference_id":"2255364","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255364"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-6859"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9z3s-qfbc-vbdc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46037?format=json","vulnerability_id":"VCID-a2as-nfu2-ykax","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32214.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32214.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32214","reference_id":"","reference_type":"","scores":[{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45719","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45749","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45731","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45707","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45727","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45675","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47584","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47713","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47721","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47668","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47787","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.4778","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47731","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32214"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196743","reference_id":"2196743","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196743"},{"reference_url":"https://security.gentoo.org/glsa/202312-03","reference_id":"GLSA-202312-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202312-03"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16","reference_id":"mfsa2023-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-17","reference_id":"mfsa2023-17","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-17"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-18","reference_id":"mfsa2023-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-18"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-32214"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a2as-nfu2-ykax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61495?format=json","vulnerability_id":"VCID-a3g7-atnx-jyg4","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6869","reference_id":"","reference_type":"","scores":[{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33635","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33723","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33516","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.40066","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.40051","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.40077","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.4004","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.40021","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.4007","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.40041","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39963","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39792","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.40078","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39999","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.40052","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6869"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-56/","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-07T20:22:28Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-56/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1799036","reference_id":"show_bug.cgi?id=1799036","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-07T20:22:28Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1799036"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-6869"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a3g7-atnx-jyg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61486?format=json","vulnerability_id":"VCID-a9j8-ync3-jfgy","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5758","reference_id":"","reference_type":"","scores":[{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53035","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53057","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.5313","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53113","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53154","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53162","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53144","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53109","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53119","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53082","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.5305","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53101","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53094","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53145","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5758"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-48","reference_id":"mfsa2023-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-48"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-48/","reference_id":"mfsa2023-48","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-12T14:59:16Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-48/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1850019","reference_id":"show_bug.cgi?id=1850019","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-12T14:59:16Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1850019"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-5758"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a9j8-ync3-jfgy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61510?format=json","vulnerability_id":"VCID-avqy-uk9j-2kev","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37209","reference_id":"","reference_type":"","scores":[{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46089","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.4603","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.47942","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53611","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53662","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.5366","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53709","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53676","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53713","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53718","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.537","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53692","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53615","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53643","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37209"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-37209"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-avqy-uk9j-2kev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61497?format=json","vulnerability_id":"VCID-azpr-25fb-5qba","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6871","reference_id":"","reference_type":"","scores":[{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37353","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37936","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37962","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37839","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37889","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37917","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37881","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37856","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37882","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.3782","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37578","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37556","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37466","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6871"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-6871"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-azpr-25fb-5qba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61505?format=json","vulnerability_id":"VCID-brmh-yppw-tqbh","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34417","reference_id":"","reference_type":"","scores":[{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54433","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54384","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54455","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59605","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59656","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59669","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59688","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59652","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.5961","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59635","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61325","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61305","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61292","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.6132","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34417"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-20","reference_id":"mfsa2023-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-20"},{"reference_url":"https://usn.ubuntu.com/6143-1/","reference_id":"USN-6143-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6143-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-34417"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-brmh-yppw-tqbh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51435?format=json","vulnerability_id":"VCID-bw96-5g6y-j3c4","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6860.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6860.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6860","reference_id":"","reference_type":"","scores":[{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62834","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62881","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63657","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63638","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64636","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.6464","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64612","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64648","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64659","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64653","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64584","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64613","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64571","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64619","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255365","reference_id":"2255365","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255365"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-6860"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bw96-5g6y-j3c4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61484?format=json","vulnerability_id":"VCID-cr2w-ffbf-rfdu","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5729","reference_id":"","reference_type":"","scores":[{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.3655","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36927","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36959","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36791","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36842","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36858","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36866","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36831","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36806","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36852","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36835","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36777","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36675","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36881","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36793","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5729"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-45","reference_id":"mfsa2023-45","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-45"},{"reference_url":"https://usn.ubuntu.com/6456-1/","reference_id":"USN-6456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-5729"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cr2w-ffbf-rfdu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61506?format=json","vulnerability_id":"VCID-e48r-fz4d-77c3","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37203","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13382","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13488","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1435","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18184","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18292","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18189","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18142","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18093","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18035","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18048","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18082","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1799","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18343","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18045","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18129","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37203"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-22/","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:50Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-22/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=291640","reference_id":"show_bug.cgi?id=291640","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:50Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=291640"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-37203"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e48r-fz4d-77c3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46030?format=json","vulnerability_id":"VCID-f4xy-kftc-mug2","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32207.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32207.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32207","reference_id":"","reference_type":"","scores":[{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49883","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49967","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.50013","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49987","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.5002","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.50031","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.50014","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.50015","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49966","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.50009","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.50048","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.50046","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.5","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.50004","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196738","reference_id":"2196738","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196738"},{"reference_url":"https://security.gentoo.org/glsa/202312-03","reference_id":"GLSA-202312-03","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-31T15:11:27Z/"}],"url":"https://security.gentoo.org/glsa/202312-03"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16","reference_id":"mfsa2023-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-16/","reference_id":"mfsa2023-16","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-31T15:11:27Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-16/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-17","reference_id":"mfsa2023-17","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-17"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-17/","reference_id":"mfsa2023-17","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-31T15:11:27Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-17/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-18","reference_id":"mfsa2023-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-18/","reference_id":"mfsa2023-18","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-31T15:11:27Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-18/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3137","reference_id":"RHSA-2023:3137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3138","reference_id":"RHSA-2023:3138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3139","reference_id":"RHSA-2023:3139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3139"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3140","reference_id":"RHSA-2023:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3141","reference_id":"RHSA-2023:3141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3142","reference_id":"RHSA-2023:3142","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3142"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3143","reference_id":"RHSA-2023:3143","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3143"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3149","reference_id":"RHSA-2023:3149","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3150","reference_id":"RHSA-2023:3150","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3150"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3151","reference_id":"RHSA-2023:3151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3152","reference_id":"RHSA-2023:3152","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3152"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3153","reference_id":"RHSA-2023:3153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3154","reference_id":"RHSA-2023:3154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3154"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3155","reference_id":"RHSA-2023:3155","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3155"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3220","reference_id":"RHSA-2023:3220","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3220"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3221","reference_id":"RHSA-2023:3221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3221"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1826116","reference_id":"show_bug.cgi?id=1826116","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-31T15:11:27Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1826116"},{"reference_url":"https://usn.ubuntu.com/6074-1/","reference_id":"USN-6074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6074-1/"},{"reference_url":"https://usn.ubuntu.com/6075-1/","reference_id":"USN-6075-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6075-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-32207"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f4xy-kftc-mug2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51438?format=json","vulnerability_id":"VCID-f6qv-znt2-2bd5","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6863.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6863.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6863","reference_id":"","reference_type":"","scores":[{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64377","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64403","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.6439","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.6437","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66203","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66178","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66214","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66228","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66222","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66146","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66173","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66141","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66189","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255369","reference_id":"2255369","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255369"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-6863"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f6qv-znt2-2bd5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61492?format=json","vulnerability_id":"VCID-gd3w-dp7g-c7bv","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6866","reference_id":"","reference_type":"","scores":[{"value":"0.01124","scoring_system":"epss","scoring_elements":"0.78349","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01124","scoring_system":"epss","scoring_elements":"0.78334","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01124","scoring_system":"epss","scoring_elements":"0.78362","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01258","scoring_system":"epss","scoring_elements":"0.79385","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01258","scoring_system":"epss","scoring_elements":"0.7935","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01258","scoring_system":"epss","scoring_elements":"0.79394","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01258","scoring_system":"epss","scoring_elements":"0.79417","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01258","scoring_system":"epss","scoring_elements":"0.79401","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01258","scoring_system":"epss","scoring_elements":"0.7939","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01258","scoring_system":"epss","scoring_elements":"0.79422","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01258","scoring_system":"epss","scoring_elements":"0.7942","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01258","scoring_system":"epss","scoring_elements":"0.79455","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01258","scoring_system":"epss","scoring_elements":"0.79372","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01258","scoring_system":"epss","scoring_elements":"0.79358","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6866"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-56/","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-27T18:53:04Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-56/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1849037","reference_id":"show_bug.cgi?id=1849037","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-27T18:53:04Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1849037"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-6866"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gd3w-dp7g-c7bv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46032?format=json","vulnerability_id":"VCID-ghqe-gsw9-c3e4","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32211.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32211.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32211","reference_id":"","reference_type":"","scores":[{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.3452","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35073","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35038","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35014","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35052","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35037","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34991","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.3476","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34741","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.3465","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.3509","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35118","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34997","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35041","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35069","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32211"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196740","reference_id":"2196740","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196740"},{"reference_url":"https://security.gentoo.org/glsa/202312-03","reference_id":"GLSA-202312-03","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:05Z/"}],"url":"https://security.gentoo.org/glsa/202312-03"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16","reference_id":"mfsa2023-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-16/","reference_id":"mfsa2023-16","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:05Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-16/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-17","reference_id":"mfsa2023-17","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-17"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-17/","reference_id":"mfsa2023-17","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:05Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-17/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-18","reference_id":"mfsa2023-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-18/","reference_id":"mfsa2023-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:05Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-18/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3137","reference_id":"RHSA-2023:3137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3138","reference_id":"RHSA-2023:3138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3139","reference_id":"RHSA-2023:3139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3139"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3140","reference_id":"RHSA-2023:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3141","reference_id":"RHSA-2023:3141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3142","reference_id":"RHSA-2023:3142","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3142"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3143","reference_id":"RHSA-2023:3143","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3143"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3149","reference_id":"RHSA-2023:3149","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3150","reference_id":"RHSA-2023:3150","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3150"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3151","reference_id":"RHSA-2023:3151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3152","reference_id":"RHSA-2023:3152","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3152"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3153","reference_id":"RHSA-2023:3153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3154","reference_id":"RHSA-2023:3154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3154"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3155","reference_id":"RHSA-2023:3155","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3155"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3220","reference_id":"RHSA-2023:3220","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3220"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3221","reference_id":"RHSA-2023:3221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3221"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1823379","reference_id":"show_bug.cgi?id=1823379","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:05Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1823379"},{"reference_url":"https://usn.ubuntu.com/6074-1/","reference_id":"USN-6074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6074-1/"},{"reference_url":"https://usn.ubuntu.com/6075-1/","reference_id":"USN-6075-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6075-1/"},{"reference_url":"https://usn.ubuntu.com/6120-1/","reference_id":"USN-6120-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6120-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-32211"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ghqe-gsw9-c3e4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61508?format=json","vulnerability_id":"VCID-hgwp-3pm8-xugw","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37205","reference_id":"","reference_type":"","scores":[{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40738","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40656","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42067","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48109","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48162","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48157","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.4818","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48153","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48217","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48212","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48168","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48148","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48164","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48139","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48159","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37205"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-37205"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hgwp-3pm8-xugw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51432?format=json","vulnerability_id":"VCID-kskc-agaw-8bcr","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6857.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6857.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6857","reference_id":"","reference_type":"","scores":[{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40745","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40775","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40755","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40783","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40707","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40757","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40764","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.4073","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40749","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45263","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45418","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45367","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45504","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255362","reference_id":"2255362","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255362"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-6857"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kskc-agaw-8bcr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46040?format=json","vulnerability_id":"VCID-ngja-2eff-h7hk","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34414.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34414.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34414","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15011","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14826","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15009","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14953","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14972","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18228","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18177","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18275","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18377","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18432","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18134","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18219","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18273","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19264","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19255","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34416"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2212841","reference_id":"2212841","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2212841"},{"reference_url":"https://security.gentoo.org/glsa/202312-03","reference_id":"GLSA-202312-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202312-03"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-19","reference_id":"mfsa2023-19","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-19"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-20","reference_id":"mfsa2023-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-20"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-21","reference_id":"mfsa2023-21","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3560","reference_id":"RHSA-2023:3560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3561","reference_id":"RHSA-2023:3561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3562","reference_id":"RHSA-2023:3562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3563","reference_id":"RHSA-2023:3563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3564","reference_id":"RHSA-2023:3564","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3564"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3565","reference_id":"RHSA-2023:3565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3566","reference_id":"RHSA-2023:3566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3567","reference_id":"RHSA-2023:3567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3567"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3578","reference_id":"RHSA-2023:3578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3579","reference_id":"RHSA-2023:3579","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3579"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3587","reference_id":"RHSA-2023:3587","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3587"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3588","reference_id":"RHSA-2023:3588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3589","reference_id":"RHSA-2023:3589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3590","reference_id":"RHSA-2023:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3596","reference_id":"RHSA-2023:3596","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3596"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3597","reference_id":"RHSA-2023:3597","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3597"},{"reference_url":"https://usn.ubuntu.com/6143-1/","reference_id":"USN-6143-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6143-1/"},{"reference_url":"https://usn.ubuntu.com/6214-1/","reference_id":"USN-6214-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6214-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-34414"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ngja-2eff-h7hk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61502?format=json","vulnerability_id":"VCID-p1te-bjdc-qke9","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32210","reference_id":"","reference_type":"","scores":[{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.39639","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.39767","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.39849","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45181","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45236","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45257","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45225","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45226","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45216","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45239","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47295","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47281","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47345","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.4735","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32210"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16","reference_id":"mfsa2023-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16"},{"reference_url":"https://usn.ubuntu.com/6074-1/","reference_id":"USN-6074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6074-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-32210"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p1te-bjdc-qke9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61482?format=json","vulnerability_id":"VCID-p3yc-cddb-hkhe","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5722","reference_id":"","reference_type":"","scores":[{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37693","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37728","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37376","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37613","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37675","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37753","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37631","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37682","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37695","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37709","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37674","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37646","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43713","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43919","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43834","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5722"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-45","reference_id":"mfsa2023-45","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-45"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-45/","reference_id":"mfsa2023-45","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-12T20:17:21Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-45/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1738426","reference_id":"show_bug.cgi?id=1738426","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-12T20:17:21Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1738426"},{"reference_url":"https://usn.ubuntu.com/6456-1/","reference_id":"USN-6456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-5722"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p3yc-cddb-hkhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61490?format=json","vulnerability_id":"VCID-pa3c-jpdg-ukhh","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6213","reference_id":"","reference_type":"","scores":[{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.449","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45141","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45164","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45106","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45158","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.4518","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45147","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45149","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45199","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45193","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45144","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45057","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45064","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45005","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6213"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49","reference_id":"mfsa2023-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49"},{"reference_url":"https://usn.ubuntu.com/6509-1/","reference_id":"USN-6509-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6509-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-6213"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pa3c-jpdg-ukhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51439?format=json","vulnerability_id":"VCID-pepm-1t68-uuf1","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6864.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6864.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6864","reference_id":"","reference_type":"","scores":[{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65707","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65731","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65732","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65706","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65721","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69208","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.6918","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69219","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69228","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69223","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.6913","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69151","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69132","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69182","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69201","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255370","reference_id":"2255370","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255370"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-6864"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pepm-1t68-uuf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61476?format=json","vulnerability_id":"VCID-pgst-zjuv-guee","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4579","reference_id":"","reference_type":"","scores":[{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31759","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31841","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.3161","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37839","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37889","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37917","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37936","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37962","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37856","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37882","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.3782","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37578","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37881","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4579"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-34/","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T17:51:58Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-34/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1842766","reference_id":"show_bug.cgi?id=1842766","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T17:51:58Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1842766"},{"reference_url":"https://usn.ubuntu.com/6320-1/","reference_id":"USN-6320-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6320-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-4579"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pgst-zjuv-guee"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61489?format=json","vulnerability_id":"VCID-pn8f-h9r2-xug8","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6211","reference_id":"","reference_type":"","scores":[{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.32858","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33349","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33381","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33212","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33255","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.3329","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33294","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33253","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.3323","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33269","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33246","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.3321","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33065","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33047","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.32971","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6211"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49","reference_id":"mfsa2023-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49"},{"reference_url":"https://usn.ubuntu.com/6509-1/","reference_id":"USN-6509-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6509-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-6211"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pn8f-h9r2-xug8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51431?format=json","vulnerability_id":"VCID-qdqj-rhcr-wbca","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6856.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6856.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6856","reference_id":"","reference_type":"","scores":[{"value":"0.10471","scoring_system":"epss","scoring_elements":"0.9327","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10471","scoring_system":"epss","scoring_elements":"0.93266","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10471","scoring_system":"epss","scoring_elements":"0.93272","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10471","scoring_system":"epss","scoring_elements":"0.93268","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10471","scoring_system":"epss","scoring_elements":"0.93273","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93441","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93446","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93421","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93397","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93405","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93413","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93416","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93422","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255360","reference_id":"2255360","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255360"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-6856"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qdqj-rhcr-wbca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61485?format=json","vulnerability_id":"VCID-qqn4-w66p-vfhd","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5731","reference_id":"","reference_type":"","scores":[{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60603","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60537","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60563","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60532","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60581","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60597","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60621","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60606","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60585","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60626","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60631","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60619","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61012","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.6107","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61063","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5731"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-45","reference_id":"mfsa2023-45","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-45"},{"reference_url":"https://usn.ubuntu.com/6456-1/","reference_id":"USN-6456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6456-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-5731"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qqn4-w66p-vfhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46039?format=json","vulnerability_id":"VCID-rafq-49c4-u7g6","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32215.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32215.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32215","reference_id":"","reference_type":"","scores":[{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50103","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50226","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50232","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50187","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.5022","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50249","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50199","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50252","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50245","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50246","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50279","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50253","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32215"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196753","reference_id":"2196753","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196753"},{"reference_url":"https://security.gentoo.org/glsa/202312-03","reference_id":"GLSA-202312-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202312-03"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16","reference_id":"mfsa2023-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-17","reference_id":"mfsa2023-17","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-17"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-18","reference_id":"mfsa2023-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3137","reference_id":"RHSA-2023:3137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3138","reference_id":"RHSA-2023:3138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3139","reference_id":"RHSA-2023:3139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3139"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3140","reference_id":"RHSA-2023:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3141","reference_id":"RHSA-2023:3141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3142","reference_id":"RHSA-2023:3142","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3142"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3143","reference_id":"RHSA-2023:3143","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3143"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3149","reference_id":"RHSA-2023:3149","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3150","reference_id":"RHSA-2023:3150","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3150"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3151","reference_id":"RHSA-2023:3151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3152","reference_id":"RHSA-2023:3152","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3152"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3153","reference_id":"RHSA-2023:3153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3154","reference_id":"RHSA-2023:3154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3154"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3155","reference_id":"RHSA-2023:3155","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3155"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3220","reference_id":"RHSA-2023:3220","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3220"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3221","reference_id":"RHSA-2023:3221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3221"},{"reference_url":"https://usn.ubuntu.com/6074-1/","reference_id":"USN-6074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6074-1/"},{"reference_url":"https://usn.ubuntu.com/6075-1/","reference_id":"USN-6075-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6075-1/"},{"reference_url":"https://usn.ubuntu.com/6120-1/","reference_id":"USN-6120-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6120-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-32215"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rafq-49c4-u7g6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46036?format=json","vulnerability_id":"VCID-rarq-q7qa-nud7","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32213.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32213.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32213","reference_id":"","reference_type":"","scores":[{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.4732","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47403","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47455","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.4746","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47447","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47933","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47943","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47997","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47992","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47956","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47914","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47936","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47884","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47937","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47932","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196742","reference_id":"2196742","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196742"},{"reference_url":"https://security.gentoo.org/glsa/202312-03","reference_id":"GLSA-202312-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202312-03"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16","reference_id":"mfsa2023-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-17","reference_id":"mfsa2023-17","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-17"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-18","reference_id":"mfsa2023-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3137","reference_id":"RHSA-2023:3137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3138","reference_id":"RHSA-2023:3138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3139","reference_id":"RHSA-2023:3139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3139"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3140","reference_id":"RHSA-2023:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3141","reference_id":"RHSA-2023:3141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3142","reference_id":"RHSA-2023:3142","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3142"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3143","reference_id":"RHSA-2023:3143","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3143"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3149","reference_id":"RHSA-2023:3149","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3150","reference_id":"RHSA-2023:3150","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3150"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3151","reference_id":"RHSA-2023:3151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3152","reference_id":"RHSA-2023:3152","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3152"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3153","reference_id":"RHSA-2023:3153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3154","reference_id":"RHSA-2023:3154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3154"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3155","reference_id":"RHSA-2023:3155","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3155"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3220","reference_id":"RHSA-2023:3220","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3220"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3221","reference_id":"RHSA-2023:3221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3221"},{"reference_url":"https://usn.ubuntu.com/6074-1/","reference_id":"USN-6074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6074-1/"},{"reference_url":"https://usn.ubuntu.com/6075-1/","reference_id":"USN-6075-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6075-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-32213"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rarq-q7qa-nud7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61479?format=json","vulnerability_id":"VCID-rawu-vyqx-2ker","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5172","reference_id":"","reference_type":"","scores":[{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47879","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47932","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47794","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55322","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55266","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55333","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55312","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55293","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.5533","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55335","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55313","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.5525","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.5529","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55271","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55321","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5172"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-41","reference_id":"mfsa2023-41","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-41"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-41/","reference_id":"mfsa2023-41","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:05Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-41/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1852218","reference_id":"show_bug.cgi?id=1852218","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:05Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1852218"},{"reference_url":"https://usn.ubuntu.com/6404-1/","reference_id":"USN-6404-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6404-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-5172"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rawu-vyqx-2ker"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61488?format=json","vulnerability_id":"VCID-rx2r-8htx-rfbt","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6210","reference_id":"","reference_type":"","scores":[{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39561","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.40051","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.40078","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39999","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.40052","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.40066","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.40077","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.4004","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.40021","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.4007","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.40041","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39963","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39792","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39777","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39692","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6210"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49","reference_id":"mfsa2023-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49"},{"reference_url":"https://usn.ubuntu.com/6509-1/","reference_id":"USN-6509-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6509-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-6210"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rx2r-8htx-rfbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61480?format=json","vulnerability_id":"VCID-sgt1-7dt3-yyau","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5173","reference_id":"","reference_type":"","scores":[{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41139","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41352","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41273","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.4679","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46845","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46844","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46867","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46847","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46899","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46831","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46839","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46822","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46841","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5173"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-41","reference_id":"mfsa2023-41","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-41"},{"reference_url":"https://usn.ubuntu.com/6404-1/","reference_id":"USN-6404-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6404-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-5173"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sgt1-7dt3-yyau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51433?format=json","vulnerability_id":"VCID-tps4-kxe2-5ugb","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6858.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6858.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6858","reference_id":"","reference_type":"","scores":[{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61769","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61764","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61774","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.6178","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61718","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63723","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.6376","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63748","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63788","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63778","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63742","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63776","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63791","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63777","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255363","reference_id":"2255363","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255363"},{"reference_url":"https://www.debian.org/security/2023/dsa-5581","reference_id":"dsa-5581","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://www.debian.org/security/2023/dsa-5581"},{"reference_url":"https://www.debian.org/security/2023/dsa-5582","reference_id":"dsa-5582","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://www.debian.org/security/2023/dsa-5582"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-54/","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-54/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-55/","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-55/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-56/","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-56/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html","reference_id":"msg00020.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1826791","reference_id":"show_bug.cgi?id=1826791","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1826791"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-6858"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tps4-kxe2-5ugb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61507?format=json","vulnerability_id":"VCID-up33-tw5e-bucs","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37204","reference_id":"","reference_type":"","scores":[{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36588","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36501","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37871","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43308","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.4336","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43375","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43396","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43365","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43409","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43398","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43332","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43266","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.4335","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43342","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.4337","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37204"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-37204"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-up33-tw5e-bucs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61477?format=json","vulnerability_id":"VCID-v4vu-azan-jyev","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5129.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5129.json"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240759","reference_id":"2240759","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240759"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5183","reference_id":"RHSA-2023:5183","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5183"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5184","reference_id":"RHSA-2023:5184","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5184"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5185","reference_id":"RHSA-2023:5185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5186","reference_id":"RHSA-2023:5186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5187","reference_id":"RHSA-2023:5187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5188","reference_id":"RHSA-2023:5188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5189","reference_id":"RHSA-2023:5189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5190","reference_id":"RHSA-2023:5190","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5191","reference_id":"RHSA-2023:5191","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5191"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5192","reference_id":"RHSA-2023:5192","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5197","reference_id":"RHSA-2023:5197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5198","reference_id":"RHSA-2023:5198","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5198"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5200","reference_id":"RHSA-2023:5200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5200"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5201","reference_id":"RHSA-2023:5201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5202","reference_id":"RHSA-2023:5202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5204","reference_id":"RHSA-2023:5204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5205","reference_id":"RHSA-2023:5205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5214","reference_id":"RHSA-2023:5214","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5214"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5223","reference_id":"RHSA-2023:5223","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5223"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5224","reference_id":"RHSA-2023:5224","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5224"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5236","reference_id":"RHSA-2023:5236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5309","reference_id":"RHSA-2023:5309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5309"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-5129"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v4vu-azan-jyev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/18987?format=json","vulnerability_id":"VCID-vdzj-kqfy-d3b7","summary":"libwebp: OOB write in BuildHuffmanTable\nHeap buffer overflow in libwebp allow a remote attacker to perform an out of bounds memory write via a crafted HTML page.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4863.json","reference_id":"","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4863.json"},{"reference_url":"https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway"},{"reference_url":"https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4863","reference_id":"","reference_type":"","scores":[{"value":"0.93606","scoring_system":"epss","scoring_elements":"0.99837","published_at":"2026-04-18T12:55:00Z"},{"value":"0.93606","scoring_system":"epss","scoring_elements":"0.99835","published_at":"2026-04-07T12:55:00Z"},{"value":"0.93606","scoring_system":"epss","scoring_elements":"0.99836","published_at":"2026-04-13T12:55:00Z"},{"value":"0.94083","scoring_system":"epss","scoring_elements":"0.99908","published_at":"2026-05-05T12:55:00Z"},{"value":"0.94083","scoring_system":"epss","scoring_elements":"0.99907","published_at":"2026-04-29T12:55:00Z"},{"value":"0.94083","scoring_system":"epss","scoring_elements":"0.99905","published_at":"2026-04-12T12:55:00Z"},{"value":"0.94117","scoring_system":"epss","scoring_elements":"0.99911","published_at":"2026-04-21T12:55:00Z"},{"value":"0.94117","scoring_system":"epss","scoring_elements":"0.9991","published_at":"2026-04-02T12:55:00Z"},{"value":"0.94117","scoring_system":"epss","scoring_elements":"0.99909","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4863"},{"reference_url":"https://blog.isosceles.com/the-webp-0day","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://blog.isosceles.com/the-webp-0day"},{"reference_url":"https://bugzilla.suse.com/show_bug.cgi?id=1215231","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1215231"},{"reference_url":"https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html"},{"reference_url":"https://crbug.com/1479274","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://crbug.com/1479274"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4863"},{"reference_url":"https://en.bandisoft.com/honeyview/history","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://en.bandisoft.com/honeyview/history"},{"reference_url":"https://en.bandisoft.com/honeyview/history/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://en.bandisoft.com/honeyview/history/"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/dlemstra/Magick.NET/releases/tag/13.3.0","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/dlemstra/Magick.NET/releases/tag/13.3.0"},{"reference_url":"https://github.com/electron/electron/pull/39823","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/electron/electron/pull/39823"},{"reference_url":"https://github.com/electron/electron/pull/39825","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/electron/electron/pull/39825"},{"reference_url":"https://github.com/electron/electron/pull/39826","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/electron/electron/pull/39826"},{"reference_url":"https://github.com/electron/electron/pull/39827","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/electron/electron/pull/39827"},{"reference_url":"https://github.com/electron/electron/pull/39828","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/electron/electron/pull/39828"},{"reference_url":"https://github.com/ImageMagick/ImageMagick/discussions/6664","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/ImageMagick/ImageMagick/discussions/6664"},{"reference_url":"https://github.com/jaredforth/webp/commit/9d4c56e63abecc777df71c702503c3eaabd7dcbc","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/jaredforth/webp/commit/9d4c56e63abecc777df71c702503c3eaabd7dcbc"},{"reference_url":"https://github.com/jaredforth/webp/pull/30","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/jaredforth/webp/pull/30"},{"reference_url":"https://github.com/python-pillow/Pillow/pull/7395","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/python-pillow/Pillow/pull/7395"},{"reference_url":"https://github.com/qnighy/libwebp-sys2-rs/commit/4560c473a76ec8bd8c650f19ddf9d7a44f719f8b","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/qnighy/libwebp-sys2-rs/commit/4560c473a76ec8bd8c650f19ddf9d7a44f719f8b"},{"reference_url":"https://github.com/qnighy/libwebp-sys2-rs/pull/21","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/qnighy/libwebp-sys2-rs/pull/21"},{"reference_url":"https://github.com/webmproject/libwebp","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/webmproject/libwebp"},{"reference_url":"https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a"},{"reference_url":"https://github.com/webmproject/libwebp/releases/tag/v1.3.2","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://github.com/webmproject/libwebp/releases/tag/v1.3.2"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I"},{"reference_url":"https://news.ycombinator.com/item?id=37478403","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://news.ycombinator.com/item?id=37478403"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4863","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4863"},{"reference_url":"https://pillow.readthedocs.io/en/stable/releasenotes/10.0.1.html#security","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://pillow.readthedocs.io/en/stable/releasenotes/10.0.1.html#security"},{"reference_url":"https://rustsec.org/advisories/RUSTSEC-2023-0060.html","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://rustsec.org/advisories/RUSTSEC-2023-0060.html"},{"reference_url":"https://rustsec.org/advisories/RUSTSEC-2023-0061.html","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://rustsec.org/advisories/RUSTSEC-2023-0061.html"},{"reference_url":"https://security.gentoo.org/glsa/202309-05","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://security.gentoo.org/glsa/202309-05"},{"reference_url":"https://security.gentoo.org/glsa/202401-10","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://security.gentoo.org/glsa/202401-10"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230929-0011","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20230929-0011"},{"reference_url":"https://sethmlarson.dev/security-developer-in-residence-weekly-report-16","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://sethmlarson.dev/security-developer-in-residence-weekly-report-16"},{"reference_url":"https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863"},{"reference_url":"https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/"},{"reference_url":"https://www.bentley.com/advisories/be-2023-0001","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.bentley.com/advisories/be-2023-0001"},{"reference_url":"https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks"},{"reference_url":"https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks/"},{"reference_url":"https://www.debian.org/security/2023/dsa-5496","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://www.debian.org/security/2023/dsa-5496"},{"reference_url":"https://www.debian.org/security/2023/dsa-5497","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://www.debian.org/security/2023/dsa-5497"},{"reference_url":"https://www.debian.org/security/2023/dsa-5498","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://www.debian.org/security/2023/dsa-5498"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-40","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"critical","scoring_system":"generic_textual","scoring_elements":""},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-40"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/"},{"reference_url":"https://www.vicarius.io/vsociety/posts/zero-day-webp-vulnerability-cve-2023-4863","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.vicarius.io/vsociety/posts/zero-day-webp-vulnerability-cve-2023-4863"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/21/4","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/21/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/22/1","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/22/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/22/3","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/22/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/22/4","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/22/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/22/5","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/22/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/22/6","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/22/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/22/7","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/22/7"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/22/8","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/22/8"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/26/1","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/26/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/26/7","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/26/7"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/28/1","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/28/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/28/2","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/28/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/28/4","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/28/4"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051787","reference_id":"1051787","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051787"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238431","reference_id":"2238431","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238431"},{"reference_url":"https://www.bentley.com/advisories/be-2023-0001/","reference_id":"be-2023-0001","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://www.bentley.com/advisories/be-2023-0001/"},{"reference_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863","reference_id":"CVE-2023-4863","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863"},{"reference_url":"https://security-tracker.debian.org/tracker/CVE-2023-4863","reference_id":"CVE-2023-4863","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://security-tracker.debian.org/tracker/CVE-2023-4863"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","reference_id":"KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230929-0011/","reference_id":"ntap-20230929-0011","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-28T05:00:18Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230929-0011/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5183","reference_id":"RHSA-2023:5183","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5183"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5184","reference_id":"RHSA-2023:5184","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5184"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5185","reference_id":"RHSA-2023:5185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5186","reference_id":"RHSA-2023:5186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5187","reference_id":"RHSA-2023:5187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5188","reference_id":"RHSA-2023:5188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5189","reference_id":"RHSA-2023:5189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5190","reference_id":"RHSA-2023:5190","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5191","reference_id":"RHSA-2023:5191","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5191"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5192","reference_id":"RHSA-2023:5192","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5197","reference_id":"RHSA-2023:5197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5198","reference_id":"RHSA-2023:5198","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5198"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5200","reference_id":"RHSA-2023:5200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5200"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5201","reference_id":"RHSA-2023:5201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5202","reference_id":"RHSA-2023:5202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5204","reference_id":"RHSA-2023:5204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5205","reference_id":"RHSA-2023:5205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5214","reference_id":"RHSA-2023:5214","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5214"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5222","reference_id":"RHSA-2023:5222","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5222"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5223","reference_id":"RHSA-2023:5223","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5223"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5224","reference_id":"RHSA-2023:5224","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5224"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5236","reference_id":"RHSA-2023:5236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5309","reference_id":"RHSA-2023:5309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5309"},{"reference_url":"https://usn.ubuntu.com/6367-1/","reference_id":"USN-6367-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6367-1/"},{"reference_url":"https://usn.ubuntu.com/6368-1/","reference_id":"USN-6368-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6368-1/"},{"reference_url":"https://usn.ubuntu.com/6369-1/","reference_id":"USN-6369-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6369-1/"},{"reference_url":"https://usn.ubuntu.com/6369-2/","reference_id":"USN-6369-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6369-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-4863","GHSA-j7hp-h8jx-5ppr"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vdzj-kqfy-d3b7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61500?format=json","vulnerability_id":"VCID-wjru-492x-fqge","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32208","reference_id":"","reference_type":"","scores":[{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.43923","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44008","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.438","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49843","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49898","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49891","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49909","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49865","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49893","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49881","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49882","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51549","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51609","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51617","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51595","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32208"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16","reference_id":"mfsa2023-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-16/","reference_id":"mfsa2023-16","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-12T20:03:38Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-16/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1646034","reference_id":"show_bug.cgi?id=1646034","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-12T20:03:38Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1646034"},{"reference_url":"https://usn.ubuntu.com/6074-1/","reference_id":"USN-6074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6074-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-32208"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wjru-492x-fqge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61503?format=json","vulnerability_id":"VCID-wk3d-jxen-bbe5","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32216","reference_id":"","reference_type":"","scores":[{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.575","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57471","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57493","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.5747","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57523","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57526","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57542","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57519","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00373","scoring_system":"epss","scoring_elements":"0.59012","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00373","scoring_system":"epss","scoring_elements":"0.59085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00373","scoring_system":"epss","scoring_elements":"0.59089","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00373","scoring_system":"epss","scoring_elements":"0.59068","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00373","scoring_system":"epss","scoring_elements":"0.59048","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00373","scoring_system":"epss","scoring_elements":"0.59066","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00373","scoring_system":"epss","scoring_elements":"0.59053","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32216"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16","reference_id":"mfsa2023-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16"},{"reference_url":"https://usn.ubuntu.com/6074-1/","reference_id":"USN-6074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6074-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-32216"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wk3d-jxen-bbe5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61509?format=json","vulnerability_id":"VCID-x21e-e2q4-a3au","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37206","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38796","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38713","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40195","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45739","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45796","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45793","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45815","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.4584","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45833","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.4578","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45709","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45784","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45768","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45789","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37206"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-37206"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x21e-e2q4-a3au"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61494?format=json","vulnerability_id":"VCID-x4v4-7y4q-mfbs","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6868","reference_id":"","reference_type":"","scores":[{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.3161","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32275","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32312","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32136","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32186","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32213","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32215","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32177","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32178","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32157","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32131","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31969","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31841","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31759","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6868"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-6868"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x4v4-7y4q-mfbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61478?format=json","vulnerability_id":"VCID-xq67-wxrq-m7hf","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5170","reference_id":"","reference_type":"","scores":[{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39007","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39087","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.38881","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46054","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.4611","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46108","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46132","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46085","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46107","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.4617","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46166","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46111","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46091","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46104","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46113","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5170"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-41","reference_id":"mfsa2023-41","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-41"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-41/","reference_id":"mfsa2023-41","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:17Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-41/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1846686","reference_id":"show_bug.cgi?id=1846686","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:17Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1846686"},{"reference_url":"https://usn.ubuntu.com/6404-1/","reference_id":"USN-6404-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6404-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-5170"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xq67-wxrq-m7hf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61501?format=json","vulnerability_id":"VCID-yx45-47gm-jkde","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32209","reference_id":"","reference_type":"","scores":[{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40203","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40239","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40263","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40186","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40238","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40249","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40261","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40223","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41351","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41764","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41738","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41665","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41573","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41569","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41491","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32209"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16","reference_id":"mfsa2023-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16"},{"reference_url":"https://usn.ubuntu.com/6074-1/","reference_id":"USN-6074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6074-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-32209"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yx45-47gm-jkde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61474?format=json","vulnerability_id":"VCID-yxag-tqku-w7fz","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3482","reference_id":"","reference_type":"","scores":[{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40672","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40755","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42093","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48124","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48177","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48172","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48195","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48153","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48174","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48232","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48227","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48183","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48165","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48168","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48179","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3482"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-22/","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-12T20:14:31Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-22/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1839464","reference_id":"show_bug.cgi?id=1839464","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-12T20:14:31Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1839464"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-3482"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yxag-tqku-w7fz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51436?format=json","vulnerability_id":"VCID-zhu4-sy56-1yea","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6861.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6861.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6861","reference_id":"","reference_type":"","scores":[{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.6171","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61704","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61609","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61639","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61658","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61672","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61694","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61663","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61682","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65981","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65995","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66006","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66004","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65975","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255367","reference_id":"2255367","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255367"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85632?format=json","purl":"pkg:ebuild/www-client/firefox-bin@115.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@115.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85633?format=json","purl":"pkg:ebuild/www-client/firefox-bin@121.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}],"aliases":["CVE-2023-6861"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zhu4-sy56-1yea"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@121.0"}