Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/thunderbird@1:140.9.1esr-1~deb12u1?distro=trixie
Typedeb
Namespacedebian
Namethunderbird
Version1:140.9.1esr-1~deb12u1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1:140.9.1esr-1~deb13u1
Latest_non_vulnerable_version1:140.9.1esr-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-5dw5-vpt8-zqbz
vulnerability_id VCID-5dw5-vpt8-zqbz
summary Memory safety bugs present in Firefox ESR 115.34.0, Firefox ESR 140.9.0, Thunderbird ESR 140.9.0, Firefox 149.0.1 and Thunderbird 149.0.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5731.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5731.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-5731
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17187
published_at 2026-04-08T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17176
published_at 2026-04-12T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17223
published_at 2026-04-11T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17244
published_at 2026-04-09T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20168
published_at 2026-04-18T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.21869
published_at 2026-04-16T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.21867
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-5731
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5731
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2455901
reference_id 2455901
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2455901
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-25
reference_id mfsa2026-25
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-25
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-25/
reference_id mfsa2026-25
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:12:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-25/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-26
reference_id mfsa2026-26
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-26
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-26/
reference_id mfsa2026-26
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:12:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-26/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-27
reference_id mfsa2026-27
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-27
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-27/
reference_id mfsa2026-27
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:12:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-27/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-28
reference_id mfsa2026-28
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-28
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-28/
reference_id mfsa2026-28
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:12:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-28/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-29
reference_id mfsa2026-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-29
14
reference_url https://www.mozilla.org/security/advisories/mfsa2026-29/
reference_id mfsa2026-29
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:12:57Z/
url https://www.mozilla.org/security/advisories/mfsa2026-29/
15
reference_url https://access.redhat.com/errata/RHSA-2026:7671
reference_id RHSA-2026:7671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7671
16
reference_url https://access.redhat.com/errata/RHSA-2026:7672
reference_id RHSA-2026:7672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7672
17
reference_url https://access.redhat.com/errata/RHSA-2026:8052
reference_id RHSA-2026:8052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8052
18
reference_url https://access.redhat.com/errata/RHSA-2026:8459
reference_id RHSA-2026:8459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8459
fixed_packages
0
url pkg:deb/debian/thunderbird@1:115.12.0-1~deb11u1?distro=trixie
purl pkg:deb/debian/thunderbird@1:115.12.0-1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:115.12.0-1~deb11u1%3Fdistro=trixie
1
url pkg:deb/debian/thunderbird@1:140.6.0esr-1~deb12u1?distro=trixie
purl pkg:deb/debian/thunderbird@1:140.6.0esr-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.6.0esr-1~deb12u1%3Fdistro=trixie
2
url pkg:deb/debian/thunderbird@1:140.8.0esr-1~deb13u1?distro=trixie
purl pkg:deb/debian/thunderbird@1:140.8.0esr-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.8.0esr-1~deb13u1%3Fdistro=trixie
3
url pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb11u1?distro=trixie
purl pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb11u1%3Fdistro=trixie
4
url pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb12u1?distro=trixie
purl pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb12u1%3Fdistro=trixie
5
url pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb13u1?distro=trixie
purl pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb13u1%3Fdistro=trixie
6
url pkg:deb/debian/thunderbird@1:140.9.1esr-1?distro=trixie
purl pkg:deb/debian/thunderbird@1:140.9.1esr-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.1esr-1%3Fdistro=trixie
aliases CVE-2026-5731
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5dw5-vpt8-zqbz
1
url VCID-9ag7-z86d-nba9
vulnerability_id VCID-9ag7-z86d-nba9
summary Memory safety bugs present in Firefox ESR 140.9.0, Thunderbird ESR 140.9.0, Firefox 149.0.1 and Thunderbird 149.0.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5734.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5734.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-5734
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13955
published_at 2026-04-09T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13876
published_at 2026-04-12T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13903
published_at 2026-04-08T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13912
published_at 2026-04-11T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18547
published_at 2026-04-16T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18602
published_at 2026-04-13T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18556
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-5734
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5734
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2455897
reference_id 2455897
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2455897
5
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=2022369%2C2023026%2C2023545%2C2023555%2C2023958%2C2025422%2C2025468%2C2025492%2C2025505
reference_id buglist.cgi?bug_id=2022369%2C2023026%2C2023545%2C2023555%2C2023958%2C2025422%2C2025468%2C2025492%2C2025505
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-08T03:55:30Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=2022369%2C2023026%2C2023545%2C2023555%2C2023958%2C2025422%2C2025468%2C2025492%2C2025505
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-25
reference_id mfsa2026-25
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-25
7
reference_url https://www.mozilla.org/security/advisories/mfsa2026-25/
reference_id mfsa2026-25
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-08T03:55:30Z/
url https://www.mozilla.org/security/advisories/mfsa2026-25/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-27
reference_id mfsa2026-27
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-27
9
reference_url https://www.mozilla.org/security/advisories/mfsa2026-27/
reference_id mfsa2026-27
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-08T03:55:30Z/
url https://www.mozilla.org/security/advisories/mfsa2026-27/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-28
reference_id mfsa2026-28
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-28
11
reference_url https://www.mozilla.org/security/advisories/mfsa2026-28/
reference_id mfsa2026-28
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-08T03:55:30Z/
url https://www.mozilla.org/security/advisories/mfsa2026-28/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-29
reference_id mfsa2026-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-29
13
reference_url https://www.mozilla.org/security/advisories/mfsa2026-29/
reference_id mfsa2026-29
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-08T03:55:30Z/
url https://www.mozilla.org/security/advisories/mfsa2026-29/
14
reference_url https://access.redhat.com/errata/RHSA-2026:7671
reference_id RHSA-2026:7671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7671
15
reference_url https://access.redhat.com/errata/RHSA-2026:7672
reference_id RHSA-2026:7672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7672
16
reference_url https://access.redhat.com/errata/RHSA-2026:8052
reference_id RHSA-2026:8052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8052
17
reference_url https://access.redhat.com/errata/RHSA-2026:8459
reference_id RHSA-2026:8459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8459
fixed_packages
0
url pkg:deb/debian/thunderbird@1:115.12.0-1~deb11u1?distro=trixie
purl pkg:deb/debian/thunderbird@1:115.12.0-1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:115.12.0-1~deb11u1%3Fdistro=trixie
1
url pkg:deb/debian/thunderbird@1:140.6.0esr-1~deb12u1?distro=trixie
purl pkg:deb/debian/thunderbird@1:140.6.0esr-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.6.0esr-1~deb12u1%3Fdistro=trixie
2
url pkg:deb/debian/thunderbird@1:140.8.0esr-1~deb13u1?distro=trixie
purl pkg:deb/debian/thunderbird@1:140.8.0esr-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.8.0esr-1~deb13u1%3Fdistro=trixie
3
url pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb11u1?distro=trixie
purl pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb11u1%3Fdistro=trixie
4
url pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb12u1?distro=trixie
purl pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb12u1%3Fdistro=trixie
5
url pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb13u1?distro=trixie
purl pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb13u1%3Fdistro=trixie
6
url pkg:deb/debian/thunderbird@1:140.9.1esr-1?distro=trixie
purl pkg:deb/debian/thunderbird@1:140.9.1esr-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.1esr-1%3Fdistro=trixie
aliases CVE-2026-5734
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ag7-z86d-nba9
2
url VCID-qbzp-euvv-q7c7
vulnerability_id VCID-qbzp-euvv-q7c7
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5732.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5732.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-5732
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.1175
published_at 2026-04-12T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11789
published_at 2026-04-11T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11778
published_at 2026-04-09T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11723
published_at 2026-04-08T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12742
published_at 2026-04-18T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12835
published_at 2026-04-13T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12738
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-5732
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5732
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2455908
reference_id 2455908
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2455908
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-25
reference_id mfsa2026-25
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-25
6
reference_url https://www.mozilla.org/security/advisories/mfsa2026-25/
reference_id mfsa2026-25
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:28:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-25/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-27
reference_id mfsa2026-27
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-27
8
reference_url https://www.mozilla.org/security/advisories/mfsa2026-27/
reference_id mfsa2026-27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:28:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-27/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-28
reference_id mfsa2026-28
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-28
10
reference_url https://www.mozilla.org/security/advisories/mfsa2026-28/
reference_id mfsa2026-28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:28:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-28/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2026-29
reference_id mfsa2026-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2026-29
12
reference_url https://www.mozilla.org/security/advisories/mfsa2026-29/
reference_id mfsa2026-29
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:28:39Z/
url https://www.mozilla.org/security/advisories/mfsa2026-29/
13
reference_url https://access.redhat.com/errata/RHSA-2026:7671
reference_id RHSA-2026:7671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7671
14
reference_url https://access.redhat.com/errata/RHSA-2026:7672
reference_id RHSA-2026:7672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7672
15
reference_url https://access.redhat.com/errata/RHSA-2026:8052
reference_id RHSA-2026:8052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8052
16
reference_url https://access.redhat.com/errata/RHSA-2026:8459
reference_id RHSA-2026:8459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8459
17
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=2017867
reference_id show_bug.cgi?id=2017867
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:28:39Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=2017867
fixed_packages
0
url pkg:deb/debian/thunderbird@1:115.12.0-1~deb11u1?distro=trixie
purl pkg:deb/debian/thunderbird@1:115.12.0-1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:115.12.0-1~deb11u1%3Fdistro=trixie
1
url pkg:deb/debian/thunderbird@1:140.6.0esr-1~deb12u1?distro=trixie
purl pkg:deb/debian/thunderbird@1:140.6.0esr-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.6.0esr-1~deb12u1%3Fdistro=trixie
2
url pkg:deb/debian/thunderbird@1:140.8.0esr-1~deb13u1?distro=trixie
purl pkg:deb/debian/thunderbird@1:140.8.0esr-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.8.0esr-1~deb13u1%3Fdistro=trixie
3
url pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb11u1?distro=trixie
purl pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb11u1%3Fdistro=trixie
4
url pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb12u1?distro=trixie
purl pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb12u1%3Fdistro=trixie
5
url pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb13u1?distro=trixie
purl pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb13u1%3Fdistro=trixie
6
url pkg:deb/debian/thunderbird@1:140.9.1esr-1?distro=trixie
purl pkg:deb/debian/thunderbird@1:140.9.1esr-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.1esr-1%3Fdistro=trixie
aliases CVE-2026-5732
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qbzp-euvv-q7c7
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.1esr-1~deb12u1%3Fdistro=trixie