Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/93110?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/93110?format=api", "purl": "pkg:rpm/redhat/firefox@115.12.0-1?arch=el9_0", "type": "rpm", "namespace": "redhat", "name": "firefox", "version": "115.12.0-1", "qualifiers": { "arch": "el9_0" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62609?format=api", "vulnerability_id": "VCID-7vfx-u76f-ubet", "summary": "By tricking the browser with a X-Frame-Options header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5691.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5691.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5691", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38523", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38571", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.3863", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38654", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38517", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38568", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38577", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38587", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38549", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38079", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38194", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38286", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.3831", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38469", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5691" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291397", "reference_id": "2291397", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291397" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-25", "reference_id": "mfsa2024-25", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-25" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-25/", "reference_id": "mfsa2024-25", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:36Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-25/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-26", "reference_id": "mfsa2024-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-26" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", "reference_id": "mfsa2024-26", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:36Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-28", "reference_id": "mfsa2024-28", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-28" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", "reference_id": "mfsa2024-28", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:36Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:36Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:36Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3949", "reference_id": "RHSA-2024:3949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3950", "reference_id": "RHSA-2024:3950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3951", "reference_id": "RHSA-2024:3951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3952", "reference_id": "RHSA-2024:3952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3953", "reference_id": "RHSA-2024:3953", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3953" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3954", "reference_id": "RHSA-2024:3954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3955", "reference_id": "RHSA-2024:3955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3958", "reference_id": "RHSA-2024:3958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3972", "reference_id": "RHSA-2024:3972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4001", "reference_id": "RHSA-2024:4001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4002", "reference_id": "RHSA-2024:4002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4003", "reference_id": "RHSA-2024:4003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4004", "reference_id": "RHSA-2024:4004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4015", "reference_id": "RHSA-2024:4015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4016", "reference_id": "RHSA-2024:4016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4018", "reference_id": "RHSA-2024:4018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4036", "reference_id": "RHSA-2024:4036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4036" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4063", "reference_id": "RHSA-2024:4063", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4063" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1888695", "reference_id": "show_bug.cgi?id=1888695", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:36Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1888695" }, { "reference_url": "https://usn.ubuntu.com/6840-1/", "reference_id": "USN-6840-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6840-1/" }, { "reference_url": "https://usn.ubuntu.com/6862-1/", "reference_id": "USN-6862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6862-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-5691" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7vfx-u76f-ubet" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36099?format=api", "vulnerability_id": "VCID-b9aw-u5wp-6uhk", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5693.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5693.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5693", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80921", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80871", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80894", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80891", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80919", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80928", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80944", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.8093", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80956", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.81012", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80999", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80987", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80979", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80959", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80958", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5693" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291399", "reference_id": "2291399", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291399" }, { "reference_url": "https://security.gentoo.org/glsa/202408-02", "reference_id": "GLSA-202408-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202408-02" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-25", "reference_id": "mfsa2024-25", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-25" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-25/", "reference_id": "mfsa2024-25", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-25/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-26", "reference_id": "mfsa2024-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-26" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", "reference_id": "mfsa2024-26", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-28", "reference_id": "mfsa2024-28", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-28" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", "reference_id": "mfsa2024-28", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3949", "reference_id": "RHSA-2024:3949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3950", "reference_id": "RHSA-2024:3950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3951", "reference_id": "RHSA-2024:3951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3952", "reference_id": "RHSA-2024:3952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3953", "reference_id": "RHSA-2024:3953", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3953" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3954", "reference_id": "RHSA-2024:3954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3955", "reference_id": "RHSA-2024:3955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3958", "reference_id": "RHSA-2024:3958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3972", "reference_id": "RHSA-2024:3972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4001", "reference_id": "RHSA-2024:4001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4002", "reference_id": "RHSA-2024:4002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4003", "reference_id": "RHSA-2024:4003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4004", "reference_id": "RHSA-2024:4004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4015", "reference_id": "RHSA-2024:4015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4016", "reference_id": "RHSA-2024:4016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4018", "reference_id": "RHSA-2024:4018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4036", "reference_id": "RHSA-2024:4036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4036" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4063", "reference_id": "RHSA-2024:4063", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4063" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1891319", "reference_id": "show_bug.cgi?id=1891319", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1891319" }, { "reference_url": "https://usn.ubuntu.com/6840-1/", "reference_id": "USN-6840-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6840-1/" }, { "reference_url": "https://usn.ubuntu.com/6862-1/", "reference_id": "USN-6862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6862-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-5693" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b9aw-u5wp-6uhk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36101?format=api", "vulnerability_id": "VCID-bshu-jxhj-27b8", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5700.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5700.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5700", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38175", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38265", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38288", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38156", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38207", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38215", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38234", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38199", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.3822", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.37733", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.37844", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.37939", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.37962", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38136", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38201", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291401", "reference_id": "2291401", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291401" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1862809%2C1889355%2C1893388%2C1895123", "reference_id": "buglist.cgi?bug_id=1862809%2C1889355%2C1893388%2C1895123", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1862809%2C1889355%2C1893388%2C1895123" }, { "reference_url": "https://security.gentoo.org/glsa/202408-02", "reference_id": "GLSA-202408-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202408-02" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-25", "reference_id": "mfsa2024-25", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-25" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-25/", "reference_id": "mfsa2024-25", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-25/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-26", "reference_id": "mfsa2024-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-26" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", "reference_id": "mfsa2024-26", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-28", "reference_id": "mfsa2024-28", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-28" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", "reference_id": "mfsa2024-28", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3949", "reference_id": "RHSA-2024:3949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3950", "reference_id": "RHSA-2024:3950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3951", "reference_id": "RHSA-2024:3951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3952", "reference_id": "RHSA-2024:3952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3953", "reference_id": "RHSA-2024:3953", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3953" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3954", "reference_id": "RHSA-2024:3954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3955", "reference_id": "RHSA-2024:3955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3958", "reference_id": "RHSA-2024:3958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3972", "reference_id": "RHSA-2024:3972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4001", "reference_id": "RHSA-2024:4001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4002", "reference_id": "RHSA-2024:4002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4003", "reference_id": "RHSA-2024:4003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4004", "reference_id": "RHSA-2024:4004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4015", "reference_id": "RHSA-2024:4015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4016", "reference_id": "RHSA-2024:4016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4018", "reference_id": "RHSA-2024:4018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4036", "reference_id": "RHSA-2024:4036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4036" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4063", "reference_id": "RHSA-2024:4063", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4063" }, { "reference_url": "https://usn.ubuntu.com/6840-1/", "reference_id": "USN-6840-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6840-1/" }, { "reference_url": "https://usn.ubuntu.com/6862-1/", "reference_id": "USN-6862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6862-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-5700" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bshu-jxhj-27b8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36100?format=api", "vulnerability_id": "VCID-gpjz-649k-f3he", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5696.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5696.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5696", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.83947", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.83967", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.83888", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.83904", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.83907", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.8393", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.83937", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.83953", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.83943", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.84028", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.84008", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.84003", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.83995", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.83969", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291400", "reference_id": "2291400", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291400" }, { "reference_url": "https://security.gentoo.org/glsa/202408-02", "reference_id": "GLSA-202408-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202408-02" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-25", "reference_id": "mfsa2024-25", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-25" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-25/", "reference_id": "mfsa2024-25", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-25/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-26", "reference_id": "mfsa2024-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-26" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", "reference_id": "mfsa2024-26", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-28", "reference_id": "mfsa2024-28", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-28" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", "reference_id": "mfsa2024-28", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3949", "reference_id": "RHSA-2024:3949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3950", "reference_id": "RHSA-2024:3950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3951", "reference_id": "RHSA-2024:3951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3952", "reference_id": "RHSA-2024:3952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3953", "reference_id": "RHSA-2024:3953", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3953" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3954", "reference_id": "RHSA-2024:3954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3955", "reference_id": "RHSA-2024:3955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3958", "reference_id": "RHSA-2024:3958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3972", "reference_id": "RHSA-2024:3972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4001", "reference_id": "RHSA-2024:4001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4002", "reference_id": "RHSA-2024:4002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4003", "reference_id": "RHSA-2024:4003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4004", "reference_id": "RHSA-2024:4004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4015", "reference_id": "RHSA-2024:4015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4016", "reference_id": "RHSA-2024:4016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4018", "reference_id": "RHSA-2024:4018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4036", "reference_id": "RHSA-2024:4036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4036" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4063", "reference_id": "RHSA-2024:4063", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4063" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1896555", "reference_id": "show_bug.cgi?id=1896555", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1896555" }, { "reference_url": "https://usn.ubuntu.com/6840-1/", "reference_id": "USN-6840-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6840-1/" }, { "reference_url": "https://usn.ubuntu.com/6862-1/", "reference_id": "USN-6862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6862-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-5696" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gpjz-649k-f3he" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62608?format=api", "vulnerability_id": "VCID-s95f-9g8b-s3es", "summary": "By monitoring the time certain operations take, an attacker could have guessed which external protocol handlers were functional on a user's system.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5690.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5690.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5690", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03717", "scoring_system": "epss", "scoring_elements": "0.87979", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03717", "scoring_system": "epss", "scoring_elements": "0.87992", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03717", "scoring_system": "epss", "scoring_elements": "0.87931", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03717", "scoring_system": "epss", "scoring_elements": "0.87944", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03717", "scoring_system": "epss", "scoring_elements": "0.87948", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03717", "scoring_system": "epss", "scoring_elements": "0.87969", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03717", "scoring_system": "epss", "scoring_elements": "0.87975", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03717", "scoring_system": "epss", "scoring_elements": "0.87986", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03717", "scoring_system": "epss", "scoring_elements": "0.87978", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03717", "scoring_system": "epss", "scoring_elements": "0.88025", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03717", "scoring_system": "epss", "scoring_elements": "0.88014", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03717", "scoring_system": "epss", "scoring_elements": "0.88007", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03717", "scoring_system": "epss", "scoring_elements": "0.8799", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03717", "scoring_system": "epss", "scoring_elements": "0.87991", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291396", "reference_id": "2291396", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291396" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-25", "reference_id": "mfsa2024-25", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-25" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-25/", "reference_id": "mfsa2024-25", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:36Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-25/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-26", "reference_id": "mfsa2024-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-26" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", "reference_id": "mfsa2024-26", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:36Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-28", "reference_id": "mfsa2024-28", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-28" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", "reference_id": "mfsa2024-28", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:36Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:36Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:36Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3949", "reference_id": "RHSA-2024:3949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3950", "reference_id": "RHSA-2024:3950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3951", "reference_id": "RHSA-2024:3951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3952", "reference_id": "RHSA-2024:3952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3953", "reference_id": "RHSA-2024:3953", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3953" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3954", "reference_id": "RHSA-2024:3954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3955", "reference_id": "RHSA-2024:3955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3958", "reference_id": "RHSA-2024:3958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3972", "reference_id": "RHSA-2024:3972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4001", "reference_id": "RHSA-2024:4001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4002", "reference_id": "RHSA-2024:4002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4003", "reference_id": "RHSA-2024:4003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4004", "reference_id": "RHSA-2024:4004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4015", "reference_id": "RHSA-2024:4015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4016", "reference_id": "RHSA-2024:4016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4018", "reference_id": "RHSA-2024:4018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4036", "reference_id": "RHSA-2024:4036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4036" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4063", "reference_id": "RHSA-2024:4063", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4063" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1883693", "reference_id": "show_bug.cgi?id=1883693", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:36Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1883693" }, { "reference_url": "https://usn.ubuntu.com/6840-1/", "reference_id": "USN-6840-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6840-1/" }, { "reference_url": "https://usn.ubuntu.com/6862-1/", "reference_id": "USN-6862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6862-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-5690" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s95f-9g8b-s3es" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50638?format=api", "vulnerability_id": "VCID-u9pc-4b61-gkeg", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5702.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5702.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5702", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00735", "scoring_system": "epss", "scoring_elements": "0.72796", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00735", "scoring_system": "epss", "scoring_elements": "0.7283", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00735", "scoring_system": "epss", "scoring_elements": "0.72742", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00735", "scoring_system": "epss", "scoring_elements": "0.72761", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00735", "scoring_system": "epss", "scoring_elements": "0.72736", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00735", "scoring_system": "epss", "scoring_elements": "0.72775", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00735", "scoring_system": "epss", "scoring_elements": "0.72788", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00735", "scoring_system": "epss", "scoring_elements": "0.72813", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00735", "scoring_system": "epss", "scoring_elements": "0.72787", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00735", "scoring_system": "epss", "scoring_elements": "0.7288", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00735", "scoring_system": "epss", "scoring_elements": "0.72883", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00735", "scoring_system": "epss", "scoring_elements": "0.72874", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00735", "scoring_system": "epss", "scoring_elements": "0.72833", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00735", "scoring_system": "epss", "scoring_elements": "0.72841", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5702" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291394", "reference_id": "2291394", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291394" }, { "reference_url": "https://security.gentoo.org/glsa/202408-02", "reference_id": "GLSA-202408-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202408-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-18", "reference_id": "mfsa2024-18", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-18" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-18/", "reference_id": "mfsa2024-18", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:00:39Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-18/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-26", "reference_id": "mfsa2024-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-26" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", "reference_id": "mfsa2024-26", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:00:39Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-28", "reference_id": "mfsa2024-28", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-28" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", "reference_id": "mfsa2024-28", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:00:39Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:00:39Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:00:39Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3949", "reference_id": "RHSA-2024:3949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3950", "reference_id": "RHSA-2024:3950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3951", "reference_id": "RHSA-2024:3951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3952", "reference_id": "RHSA-2024:3952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3953", "reference_id": "RHSA-2024:3953", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3953" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3954", "reference_id": "RHSA-2024:3954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3955", "reference_id": "RHSA-2024:3955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3958", "reference_id": "RHSA-2024:3958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3972", "reference_id": "RHSA-2024:3972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4001", "reference_id": "RHSA-2024:4001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4002", "reference_id": "RHSA-2024:4002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4003", "reference_id": "RHSA-2024:4003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4004", "reference_id": "RHSA-2024:4004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4015", "reference_id": "RHSA-2024:4015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4016", "reference_id": "RHSA-2024:4016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4018", "reference_id": "RHSA-2024:4018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4036", "reference_id": "RHSA-2024:4036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4036" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4063", "reference_id": "RHSA-2024:4063", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4063" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1193389", "reference_id": "show_bug.cgi?id=1193389", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:00:39Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1193389" }, { "reference_url": "https://usn.ubuntu.com/6840-1/", "reference_id": "USN-6840-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6840-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-5702" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u9pc-4b61-gkeg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62607?format=api", "vulnerability_id": "VCID-v789-nhyw-wugk", "summary": "If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5688.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5688.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5688", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01155", "scoring_system": "epss", "scoring_elements": "0.78527", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01155", "scoring_system": "epss", "scoring_elements": "0.78482", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01155", "scoring_system": "epss", "scoring_elements": "0.78513", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01155", "scoring_system": "epss", "scoring_elements": "0.78496", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01155", "scoring_system": "epss", "scoring_elements": "0.78523", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01155", "scoring_system": "epss", "scoring_elements": "0.78528", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01155", "scoring_system": "epss", "scoring_elements": "0.78553", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01155", "scoring_system": "epss", "scoring_elements": "0.78535", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01155", "scoring_system": "epss", "scoring_elements": "0.78555", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01155", "scoring_system": "epss", "scoring_elements": "0.78625", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01155", "scoring_system": "epss", "scoring_elements": "0.78609", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01155", "scoring_system": "epss", "scoring_elements": "0.78592", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01155", "scoring_system": "epss", "scoring_elements": "0.78584", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01155", "scoring_system": "epss", "scoring_elements": "0.78552", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01155", "scoring_system": "epss", "scoring_elements": "0.78554", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291395", "reference_id": "2291395", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291395" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-25", "reference_id": "mfsa2024-25", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-25" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-25/", "reference_id": "mfsa2024-25", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:33Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-25/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-26", "reference_id": "mfsa2024-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-26" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", "reference_id": "mfsa2024-26", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:33Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-28", "reference_id": "mfsa2024-28", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-28" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", "reference_id": "mfsa2024-28", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:33Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:33Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:33Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3949", "reference_id": "RHSA-2024:3949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3950", "reference_id": "RHSA-2024:3950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3951", "reference_id": "RHSA-2024:3951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3952", "reference_id": "RHSA-2024:3952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3953", "reference_id": "RHSA-2024:3953", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3953" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3954", "reference_id": "RHSA-2024:3954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3955", "reference_id": "RHSA-2024:3955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3958", "reference_id": "RHSA-2024:3958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3972", "reference_id": "RHSA-2024:3972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4001", "reference_id": "RHSA-2024:4001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4002", "reference_id": "RHSA-2024:4002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4003", "reference_id": "RHSA-2024:4003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4004", "reference_id": "RHSA-2024:4004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4015", "reference_id": "RHSA-2024:4015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4016", "reference_id": "RHSA-2024:4016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4018", "reference_id": "RHSA-2024:4018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4036", "reference_id": "RHSA-2024:4036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4036" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4063", "reference_id": "RHSA-2024:4063", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4063" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895086", "reference_id": "show_bug.cgi?id=1895086", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:33Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895086" }, { "reference_url": "https://usn.ubuntu.com/6840-1/", "reference_id": "USN-6840-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6840-1/" }, { "reference_url": "https://usn.ubuntu.com/6862-1/", "reference_id": "USN-6862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6862-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-5688" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v789-nhyw-wugk" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@115.12.0-1%3Farch=el9_0" }