Lookup for vulnerable packages by Package URL.

Purlpkg:alpm/archlinux/thunderbird@60.7.0-1
Typealpm
Namespacearchlinux
Namethunderbird
Version60.7.0-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version60.7.1-1
Latest_non_vulnerable_version91.10-1
Affected_by_vulnerabilities
0
url VCID-1x4b-p9es-u7fj
vulnerability_id VCID-1x4b-p9es-u7fj
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11705.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11705.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11705
reference_id
reference_type
scores
0
value 0.08708
scoring_system epss
scoring_elements 0.92447
published_at 2026-04-01T12:55:00Z
1
value 0.08708
scoring_system epss
scoring_elements 0.92498
published_at 2026-04-18T12:55:00Z
2
value 0.08708
scoring_system epss
scoring_elements 0.9249
published_at 2026-04-12T12:55:00Z
3
value 0.08708
scoring_system epss
scoring_elements 0.92489
published_at 2026-04-13T12:55:00Z
4
value 0.08708
scoring_system epss
scoring_elements 0.92499
published_at 2026-04-16T12:55:00Z
5
value 0.08708
scoring_system epss
scoring_elements 0.92454
published_at 2026-04-02T12:55:00Z
6
value 0.08708
scoring_system epss
scoring_elements 0.92463
published_at 2026-04-04T12:55:00Z
7
value 0.08708
scoring_system epss
scoring_elements 0.92466
published_at 2026-04-07T12:55:00Z
8
value 0.08708
scoring_system epss
scoring_elements 0.92477
published_at 2026-04-08T12:55:00Z
9
value 0.08708
scoring_system epss
scoring_elements 0.92482
published_at 2026-04-09T12:55:00Z
10
value 0.08708
scoring_system epss
scoring_elements 0.92488
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11705
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11703
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11704
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11706
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1720008
reference_id 1720008
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1720008
8
reference_url https://security.archlinux.org/ASA-201906-10
reference_id ASA-201906-10
reference_type
scores
url https://security.archlinux.org/ASA-201906-10
9
reference_url https://security.archlinux.org/AVG-980
reference_id AVG-980
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-980
10
reference_url https://github.com/x41sec/advisories/tree/master/X41-2019-003
reference_id CVE-2019-11705
reference_type exploit
scores
url https://github.com/x41sec/advisories/tree/master/X41-2019-003
11
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/47004.txt
reference_id CVE-2019-11705
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/47004.txt
12
reference_url https://security.gentoo.org/glsa/201908-20
reference_id GLSA-201908-20
reference_type
scores
url https://security.gentoo.org/glsa/201908-20
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-17
reference_id mfsa2019-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-17
14
reference_url https://access.redhat.com/errata/RHSA-2019:1623
reference_id RHSA-2019:1623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1623
15
reference_url https://access.redhat.com/errata/RHSA-2019:1624
reference_id RHSA-2019:1624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1624
16
reference_url https://access.redhat.com/errata/RHSA-2019:1626
reference_id RHSA-2019:1626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1626
17
reference_url https://usn.ubuntu.com/4028-1/
reference_id USN-4028-1
reference_type
scores
url https://usn.ubuntu.com/4028-1/
fixed_packages
0
url pkg:alpm/archlinux/thunderbird@60.7.1-1
purl pkg:alpm/archlinux/thunderbird@60.7.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/thunderbird@60.7.1-1
aliases CVE-2019-11705
risk_score 10.0
exploitability 2.0
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1x4b-p9es-u7fj
1
url VCID-ckth-a939-dydh
vulnerability_id VCID-ckth-a939-dydh
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11704.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11704.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11704
reference_id
reference_type
scores
0
value 0.08297
scoring_system epss
scoring_elements 0.92224
published_at 2026-04-01T12:55:00Z
1
value 0.08297
scoring_system epss
scoring_elements 0.92269
published_at 2026-04-18T12:55:00Z
2
value 0.08297
scoring_system epss
scoring_elements 0.92261
published_at 2026-04-12T12:55:00Z
3
value 0.08297
scoring_system epss
scoring_elements 0.92258
published_at 2026-04-13T12:55:00Z
4
value 0.08297
scoring_system epss
scoring_elements 0.9227
published_at 2026-04-16T12:55:00Z
5
value 0.08297
scoring_system epss
scoring_elements 0.92231
published_at 2026-04-02T12:55:00Z
6
value 0.08297
scoring_system epss
scoring_elements 0.92237
published_at 2026-04-04T12:55:00Z
7
value 0.08297
scoring_system epss
scoring_elements 0.92239
published_at 2026-04-07T12:55:00Z
8
value 0.08297
scoring_system epss
scoring_elements 0.92251
published_at 2026-04-08T12:55:00Z
9
value 0.08297
scoring_system epss
scoring_elements 0.92254
published_at 2026-04-09T12:55:00Z
10
value 0.08297
scoring_system epss
scoring_elements 0.9226
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11704
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11703
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11704
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11706
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1720006
reference_id 1720006
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1720006
8
reference_url https://security.archlinux.org/ASA-201906-10
reference_id ASA-201906-10
reference_type
scores
url https://security.archlinux.org/ASA-201906-10
9
reference_url https://security.archlinux.org/AVG-980
reference_id AVG-980
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-980
10
reference_url https://github.com/x41sec/advisories/tree/master/X41-2019-001
reference_id CVE-2019-11704
reference_type exploit
scores
url https://github.com/x41sec/advisories/tree/master/X41-2019-001
11
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/47002.txt
reference_id CVE-2019-11704
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/47002.txt
12
reference_url https://security.gentoo.org/glsa/201908-20
reference_id GLSA-201908-20
reference_type
scores
url https://security.gentoo.org/glsa/201908-20
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-17
reference_id mfsa2019-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-17
14
reference_url https://access.redhat.com/errata/RHSA-2019:1623
reference_id RHSA-2019:1623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1623
15
reference_url https://access.redhat.com/errata/RHSA-2019:1624
reference_id RHSA-2019:1624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1624
16
reference_url https://access.redhat.com/errata/RHSA-2019:1626
reference_id RHSA-2019:1626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1626
17
reference_url https://usn.ubuntu.com/4028-1/
reference_id USN-4028-1
reference_type
scores
url https://usn.ubuntu.com/4028-1/
fixed_packages
0
url pkg:alpm/archlinux/thunderbird@60.7.1-1
purl pkg:alpm/archlinux/thunderbird@60.7.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/thunderbird@60.7.1-1
aliases CVE-2019-11704
risk_score 10.0
exploitability 2.0
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ckth-a939-dydh
2
url VCID-dk34-s8e2-uya4
vulnerability_id VCID-dk34-s8e2-uya4
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11703.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11703.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11703
reference_id
reference_type
scores
0
value 0.08297
scoring_system epss
scoring_elements 0.92224
published_at 2026-04-01T12:55:00Z
1
value 0.08297
scoring_system epss
scoring_elements 0.92269
published_at 2026-04-18T12:55:00Z
2
value 0.08297
scoring_system epss
scoring_elements 0.92261
published_at 2026-04-12T12:55:00Z
3
value 0.08297
scoring_system epss
scoring_elements 0.92258
published_at 2026-04-13T12:55:00Z
4
value 0.08297
scoring_system epss
scoring_elements 0.9227
published_at 2026-04-16T12:55:00Z
5
value 0.08297
scoring_system epss
scoring_elements 0.92231
published_at 2026-04-02T12:55:00Z
6
value 0.08297
scoring_system epss
scoring_elements 0.92237
published_at 2026-04-04T12:55:00Z
7
value 0.08297
scoring_system epss
scoring_elements 0.92239
published_at 2026-04-07T12:55:00Z
8
value 0.08297
scoring_system epss
scoring_elements 0.92251
published_at 2026-04-08T12:55:00Z
9
value 0.08297
scoring_system epss
scoring_elements 0.92254
published_at 2026-04-09T12:55:00Z
10
value 0.08297
scoring_system epss
scoring_elements 0.9226
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11703
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11703
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11704
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11706
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1720001
reference_id 1720001
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1720001
8
reference_url https://security.archlinux.org/ASA-201906-10
reference_id ASA-201906-10
reference_type
scores
url https://security.archlinux.org/ASA-201906-10
9
reference_url https://security.archlinux.org/AVG-980
reference_id AVG-980
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-980
10
reference_url https://github.com/x41sec/advisories/tree/master/X41-2019-002
reference_id CVE-2019-11703
reference_type exploit
scores
url https://github.com/x41sec/advisories/tree/master/X41-2019-002
11
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/47003.txt
reference_id CVE-2019-11703
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/47003.txt
12
reference_url https://security.gentoo.org/glsa/201908-20
reference_id GLSA-201908-20
reference_type
scores
url https://security.gentoo.org/glsa/201908-20
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-17
reference_id mfsa2019-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-17
14
reference_url https://access.redhat.com/errata/RHSA-2019:1623
reference_id RHSA-2019:1623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1623
15
reference_url https://access.redhat.com/errata/RHSA-2019:1624
reference_id RHSA-2019:1624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1624
16
reference_url https://access.redhat.com/errata/RHSA-2019:1626
reference_id RHSA-2019:1626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1626
17
reference_url https://usn.ubuntu.com/4028-1/
reference_id USN-4028-1
reference_type
scores
url https://usn.ubuntu.com/4028-1/
fixed_packages
0
url pkg:alpm/archlinux/thunderbird@60.7.1-1
purl pkg:alpm/archlinux/thunderbird@60.7.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/thunderbird@60.7.1-1
aliases CVE-2019-11703
risk_score 10.0
exploitability 2.0
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dk34-s8e2-uya4
3
url VCID-m6hy-v2x8-e3b5
vulnerability_id VCID-m6hy-v2x8-e3b5
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11706.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11706.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11706
reference_id
reference_type
scores
0
value 0.04094
scoring_system epss
scoring_elements 0.88531
published_at 2026-04-01T12:55:00Z
1
value 0.04094
scoring_system epss
scoring_elements 0.88597
published_at 2026-04-18T12:55:00Z
2
value 0.04094
scoring_system epss
scoring_elements 0.88586
published_at 2026-04-12T12:55:00Z
3
value 0.04094
scoring_system epss
scoring_elements 0.88587
published_at 2026-04-13T12:55:00Z
4
value 0.04094
scoring_system epss
scoring_elements 0.886
published_at 2026-04-16T12:55:00Z
5
value 0.04094
scoring_system epss
scoring_elements 0.88539
published_at 2026-04-02T12:55:00Z
6
value 0.04094
scoring_system epss
scoring_elements 0.88556
published_at 2026-04-04T12:55:00Z
7
value 0.04094
scoring_system epss
scoring_elements 0.8856
published_at 2026-04-07T12:55:00Z
8
value 0.04094
scoring_system epss
scoring_elements 0.88578
published_at 2026-04-08T12:55:00Z
9
value 0.04094
scoring_system epss
scoring_elements 0.88582
published_at 2026-04-09T12:55:00Z
10
value 0.04094
scoring_system epss
scoring_elements 0.88594
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11706
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11703
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11704
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11706
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1720011
reference_id 1720011
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1720011
8
reference_url https://security.archlinux.org/ASA-201906-10
reference_id ASA-201906-10
reference_type
scores
url https://security.archlinux.org/ASA-201906-10
9
reference_url https://security.archlinux.org/AVG-980
reference_id AVG-980
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-980
10
reference_url https://github.com/x41sec/advisories/tree/master/X41-2019-004
reference_id CVE-2019-11706
reference_type exploit
scores
url https://github.com/x41sec/advisories/tree/master/X41-2019-004
11
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/47001.txt
reference_id CVE-2019-11706
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/47001.txt
12
reference_url https://security.gentoo.org/glsa/201908-20
reference_id GLSA-201908-20
reference_type
scores
url https://security.gentoo.org/glsa/201908-20
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-17
reference_id mfsa2019-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-17
14
reference_url https://access.redhat.com/errata/RHSA-2019:1623
reference_id RHSA-2019:1623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1623
15
reference_url https://access.redhat.com/errata/RHSA-2019:1624
reference_id RHSA-2019:1624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1624
16
reference_url https://access.redhat.com/errata/RHSA-2019:1626
reference_id RHSA-2019:1626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1626
17
reference_url https://usn.ubuntu.com/4028-1/
reference_id USN-4028-1
reference_type
scores
url https://usn.ubuntu.com/4028-1/
fixed_packages
0
url pkg:alpm/archlinux/thunderbird@60.7.1-1
purl pkg:alpm/archlinux/thunderbird@60.7.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/thunderbird@60.7.1-1
aliases CVE-2019-11706
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m6hy-v2x8-e3b5
Fixing_vulnerabilities
0
url VCID-7ej9-whhw-97hn
vulnerability_id VCID-7ej9-whhw-97hn
summary A vulnerability where a JavaScript compartment mismatch can occur while working with the fetch API, resulting in a potentially exploitable crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9819.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9819.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9819
reference_id
reference_type
scores
0
value 0.00554
scoring_system epss
scoring_elements 0.68126
published_at 2026-04-18T12:55:00Z
1
value 0.00554
scoring_system epss
scoring_elements 0.68085
published_at 2026-04-08T12:55:00Z
2
value 0.00554
scoring_system epss
scoring_elements 0.68099
published_at 2026-04-09T12:55:00Z
3
value 0.00554
scoring_system epss
scoring_elements 0.68124
published_at 2026-04-11T12:55:00Z
4
value 0.00554
scoring_system epss
scoring_elements 0.68111
published_at 2026-04-12T12:55:00Z
5
value 0.00554
scoring_system epss
scoring_elements 0.68077
published_at 2026-04-13T12:55:00Z
6
value 0.00554
scoring_system epss
scoring_elements 0.68114
published_at 2026-04-16T12:55:00Z
7
value 0.00554
scoring_system epss
scoring_elements 0.68014
published_at 2026-04-01T12:55:00Z
8
value 0.00554
scoring_system epss
scoring_elements 0.68035
published_at 2026-04-02T12:55:00Z
9
value 0.00554
scoring_system epss
scoring_elements 0.68055
published_at 2026-04-04T12:55:00Z
10
value 0.00554
scoring_system epss
scoring_elements 0.68033
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9819
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1712628
reference_id 1712628
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1712628
17
reference_url https://security.archlinux.org/ASA-201905-8
reference_id ASA-201905-8
reference_type
scores
url https://security.archlinux.org/ASA-201905-8
18
reference_url https://security.archlinux.org/ASA-201905-9
reference_id ASA-201905-9
reference_type
scores
url https://security.archlinux.org/ASA-201905-9
19
reference_url https://security.archlinux.org/AVG-965
reference_id AVG-965
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-965
20
reference_url https://security.archlinux.org/AVG-966
reference_id AVG-966
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-966
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
reference_id mfsa2019-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
24
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
25
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
26
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
27
reference_url https://access.redhat.com/errata/RHSA-2019:1308
reference_id RHSA-2019:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1308
28
reference_url https://access.redhat.com/errata/RHSA-2019:1309
reference_id RHSA-2019:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1309
29
reference_url https://access.redhat.com/errata/RHSA-2019:1310
reference_id RHSA-2019:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1310
30
reference_url https://usn.ubuntu.com/3991-1/
reference_id USN-3991-1
reference_type
scores
url https://usn.ubuntu.com/3991-1/
31
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
fixed_packages
0
url pkg:alpm/archlinux/thunderbird@60.7.0-1
purl pkg:alpm/archlinux/thunderbird@60.7.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1x4b-p9es-u7fj
1
vulnerability VCID-ckth-a939-dydh
2
vulnerability VCID-dk34-s8e2-uya4
3
vulnerability VCID-m6hy-v2x8-e3b5
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/thunderbird@60.7.0-1
aliases CVE-2019-9819
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ej9-whhw-97hn
1
url VCID-fx8t-41tv-hkdu
vulnerability_id VCID-fx8t-41tv-hkdu
summary
Use After Free
png_image_free in png.c in libpng has a use-after-free because png_image_free_function is called under png_safe_execute.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html
5
reference_url http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7317.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7317.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-7317
reference_id
reference_type
scores
0
value 0.00565
scoring_system epss
scoring_elements 0.68477
published_at 2026-04-18T12:55:00Z
1
value 0.00565
scoring_system epss
scoring_elements 0.68464
published_at 2026-04-16T12:55:00Z
2
value 0.00565
scoring_system epss
scoring_elements 0.6836
published_at 2026-04-01T12:55:00Z
3
value 0.00565
scoring_system epss
scoring_elements 0.68426
published_at 2026-04-13T12:55:00Z
4
value 0.00565
scoring_system epss
scoring_elements 0.68458
published_at 2026-04-12T12:55:00Z
5
value 0.00565
scoring_system epss
scoring_elements 0.6847
published_at 2026-04-11T12:55:00Z
6
value 0.00565
scoring_system epss
scoring_elements 0.68444
published_at 2026-04-09T12:55:00Z
7
value 0.00565
scoring_system epss
scoring_elements 0.68427
published_at 2026-04-08T12:55:00Z
8
value 0.00565
scoring_system epss
scoring_elements 0.68376
published_at 2026-04-07T12:55:00Z
9
value 0.00565
scoring_system epss
scoring_elements 0.684
published_at 2026-04-04T12:55:00Z
10
value 0.00565
scoring_system epss
scoring_elements 0.68381
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-7317
8
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
22
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
23
reference_url https://github.com/glennrp/libpng/issues/275
reference_id
reference_type
scores
url https://github.com/glennrp/libpng/issues/275
24
reference_url https://lists.debian.org/debian-lts-announce/2019/05/msg00032.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/05/msg00032.html
25
reference_url https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html
26
reference_url https://seclists.org/bugtraq/2019/Apr/30
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Apr/30
27
reference_url https://seclists.org/bugtraq/2019/Apr/36
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Apr/36
28
reference_url https://seclists.org/bugtraq/2019/May/56
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/May/56
29
reference_url https://seclists.org/bugtraq/2019/May/59
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/May/59
30
reference_url https://seclists.org/bugtraq/2019/May/67
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/May/67
31
reference_url https://security.gentoo.org/glsa/201908-02
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/201908-02
32
reference_url https://security.netapp.com/advisory/ntap-20190719-0005/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190719-0005/
33
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
reference_id
reference_type
scores
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
34
reference_url https://www.debian.org/security/2019/dsa-4435
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4435
35
reference_url https://www.debian.org/security/2019/dsa-4448
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4448
36
reference_url https://www.debian.org/security/2019/dsa-4451
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4451
37
reference_url https://www.oracle.com/security-alerts/cpuApr2021.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuApr2021.html
38
reference_url https://www.oracle.com/security-alerts/cpuoct2021.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuoct2021.html
39
reference_url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
40
reference_url http://www.securityfocus.com/bid/108098
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/108098
41
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1672409
reference_id 1672409
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1672409
42
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921355
reference_id 921355
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921355
43
reference_url https://security.archlinux.org/ASA-201904-10
reference_id ASA-201904-10
reference_type
scores
url https://security.archlinux.org/ASA-201904-10
44
reference_url https://security.archlinux.org/ASA-201905-8
reference_id ASA-201905-8
reference_type
scores
url https://security.archlinux.org/ASA-201905-8
45
reference_url https://security.archlinux.org/ASA-201905-9
reference_id ASA-201905-9
reference_type
scores
url https://security.archlinux.org/ASA-201905-9
46
reference_url https://security.archlinux.org/AVG-868
reference_id AVG-868
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-868
47
reference_url https://security.archlinux.org/AVG-965
reference_id AVG-965
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-965
48
reference_url https://security.archlinux.org/AVG-966
reference_id AVG-966
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-966
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hpe:xp7_command_view_advanced_edition_suite:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hpe:xp7_command_view_advanced_edition_suite:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hpe:xp7_command_view_advanced_edition_suite:*:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_id cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:vmware_vsphere:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:windows:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vcenter:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vcenter:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vcenter:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:*:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_unified_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:*:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:*:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:*:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:*:*:*:*:*:web_services_proxy:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:*:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:oracle:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:sap:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:oracle:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:sap:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore:-:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:package_hub:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:package_hub:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:package_hub:-:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.2.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.2.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.2.6.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:7u221:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:7u221:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:7u221:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u212:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u212:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u212:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.3:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:12.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:12.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:12.0.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-7317
reference_id CVE-2019-7317
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-7317
107
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
reference_id mfsa2019-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
108
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
109
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
110
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
111
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
112
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
113
reference_url https://access.redhat.com/errata/RHSA-2019:1308
reference_id RHSA-2019:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1308
114
reference_url https://access.redhat.com/errata/RHSA-2019:1309
reference_id RHSA-2019:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1309
115
reference_url https://access.redhat.com/errata/RHSA-2019:1310
reference_id RHSA-2019:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1310
116
reference_url https://access.redhat.com/errata/RHSA-2019:2494
reference_id RHSA-2019:2494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2494
117
reference_url https://access.redhat.com/errata/RHSA-2019:2495
reference_id RHSA-2019:2495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2495
118
reference_url https://access.redhat.com/errata/RHSA-2019:2585
reference_id RHSA-2019:2585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2585
119
reference_url https://access.redhat.com/errata/RHSA-2019:2590
reference_id RHSA-2019:2590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2590
120
reference_url https://access.redhat.com/errata/RHSA-2019:2592
reference_id RHSA-2019:2592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2592
121
reference_url https://access.redhat.com/errata/RHSA-2019:2737
reference_id RHSA-2019:2737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2737
122
reference_url https://usn.ubuntu.com/3962-1/
reference_id USN-3962-1
reference_type
scores
url https://usn.ubuntu.com/3962-1/
123
reference_url https://usn.ubuntu.com/3991-1/
reference_id USN-3991-1
reference_type
scores
url https://usn.ubuntu.com/3991-1/
124
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
125
reference_url https://usn.ubuntu.com/4080-1/
reference_id USN-4080-1
reference_type
scores
url https://usn.ubuntu.com/4080-1/
126
reference_url https://usn.ubuntu.com/4083-1/
reference_id USN-4083-1
reference_type
scores
url https://usn.ubuntu.com/4083-1/
fixed_packages
0
url pkg:alpm/archlinux/thunderbird@60.7.0-1
purl pkg:alpm/archlinux/thunderbird@60.7.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1x4b-p9es-u7fj
1
vulnerability VCID-ckth-a939-dydh
2
vulnerability VCID-dk34-s8e2-uya4
3
vulnerability VCID-m6hy-v2x8-e3b5
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/thunderbird@60.7.0-1
aliases CVE-2019-7317
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fx8t-41tv-hkdu
2
url VCID-g3nf-qnz2-h7gg
vulnerability_id VCID-g3nf-qnz2-h7gg
summary Images from a different domain can be read using a canvas object in some circumstances. This could be used to steal image data from a different site in violation of same-origin policy.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9817.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9817.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9817
reference_id
reference_type
scores
0
value 0.00191
scoring_system epss
scoring_elements 0.41035
published_at 2026-04-18T12:55:00Z
1
value 0.00191
scoring_system epss
scoring_elements 0.41049
published_at 2026-04-08T12:55:00Z
2
value 0.00191
scoring_system epss
scoring_elements 0.41056
published_at 2026-04-09T12:55:00Z
3
value 0.00191
scoring_system epss
scoring_elements 0.41074
published_at 2026-04-11T12:55:00Z
4
value 0.00191
scoring_system epss
scoring_elements 0.41038
published_at 2026-04-12T12:55:00Z
5
value 0.00191
scoring_system epss
scoring_elements 0.41022
published_at 2026-04-13T12:55:00Z
6
value 0.00191
scoring_system epss
scoring_elements 0.41065
published_at 2026-04-16T12:55:00Z
7
value 0.00191
scoring_system epss
scoring_elements 0.4096
published_at 2026-04-01T12:55:00Z
8
value 0.00191
scoring_system epss
scoring_elements 0.41041
published_at 2026-04-02T12:55:00Z
9
value 0.00191
scoring_system epss
scoring_elements 0.41073
published_at 2026-04-04T12:55:00Z
10
value 0.00191
scoring_system epss
scoring_elements 0.40999
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9817
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1712626
reference_id 1712626
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1712626
17
reference_url https://security.archlinux.org/ASA-201905-8
reference_id ASA-201905-8
reference_type
scores
url https://security.archlinux.org/ASA-201905-8
18
reference_url https://security.archlinux.org/ASA-201905-9
reference_id ASA-201905-9
reference_type
scores
url https://security.archlinux.org/ASA-201905-9
19
reference_url https://security.archlinux.org/AVG-965
reference_id AVG-965
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-965
20
reference_url https://security.archlinux.org/AVG-966
reference_id AVG-966
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-966
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
reference_id mfsa2019-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
24
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
25
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
26
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
27
reference_url https://access.redhat.com/errata/RHSA-2019:1308
reference_id RHSA-2019:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1308
28
reference_url https://access.redhat.com/errata/RHSA-2019:1309
reference_id RHSA-2019:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1309
29
reference_url https://access.redhat.com/errata/RHSA-2019:1310
reference_id RHSA-2019:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1310
30
reference_url https://usn.ubuntu.com/3991-1/
reference_id USN-3991-1
reference_type
scores
url https://usn.ubuntu.com/3991-1/
31
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
fixed_packages
0
url pkg:alpm/archlinux/thunderbird@60.7.0-1
purl pkg:alpm/archlinux/thunderbird@60.7.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1x4b-p9es-u7fj
1
vulnerability VCID-ckth-a939-dydh
2
vulnerability VCID-dk34-s8e2-uya4
3
vulnerability VCID-m6hy-v2x8-e3b5
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/thunderbird@60.7.0-1
aliases CVE-2019-9817
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g3nf-qnz2-h7gg
3
url VCID-k321-r7qq-gbb9
vulnerability_id VCID-k321-r7qq-gbb9
summary A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11691.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11691.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11691
reference_id
reference_type
scores
0
value 0.00516
scoring_system epss
scoring_elements 0.66694
published_at 2026-04-18T12:55:00Z
1
value 0.00516
scoring_system epss
scoring_elements 0.66657
published_at 2026-04-08T12:55:00Z
2
value 0.00516
scoring_system epss
scoring_elements 0.66671
published_at 2026-04-09T12:55:00Z
3
value 0.00516
scoring_system epss
scoring_elements 0.6669
published_at 2026-04-11T12:55:00Z
4
value 0.00516
scoring_system epss
scoring_elements 0.66678
published_at 2026-04-12T12:55:00Z
5
value 0.00516
scoring_system epss
scoring_elements 0.66645
published_at 2026-04-13T12:55:00Z
6
value 0.00516
scoring_system epss
scoring_elements 0.6668
published_at 2026-04-16T12:55:00Z
7
value 0.00516
scoring_system epss
scoring_elements 0.66572
published_at 2026-04-01T12:55:00Z
8
value 0.00516
scoring_system epss
scoring_elements 0.66611
published_at 2026-04-02T12:55:00Z
9
value 0.00516
scoring_system epss
scoring_elements 0.66638
published_at 2026-04-04T12:55:00Z
10
value 0.00516
scoring_system epss
scoring_elements 0.66609
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11691
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1712617
reference_id 1712617
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1712617
17
reference_url https://security.archlinux.org/ASA-201905-8
reference_id ASA-201905-8
reference_type
scores
url https://security.archlinux.org/ASA-201905-8
18
reference_url https://security.archlinux.org/ASA-201905-9
reference_id ASA-201905-9
reference_type
scores
url https://security.archlinux.org/ASA-201905-9
19
reference_url https://security.archlinux.org/AVG-965
reference_id AVG-965
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-965
20
reference_url https://security.archlinux.org/AVG-966
reference_id AVG-966
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-966
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
reference_id mfsa2019-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
24
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
25
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
26
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
27
reference_url https://access.redhat.com/errata/RHSA-2019:1308
reference_id RHSA-2019:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1308
28
reference_url https://access.redhat.com/errata/RHSA-2019:1309
reference_id RHSA-2019:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1309
29
reference_url https://access.redhat.com/errata/RHSA-2019:1310
reference_id RHSA-2019:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1310
30
reference_url https://usn.ubuntu.com/3991-1/
reference_id USN-3991-1
reference_type
scores
url https://usn.ubuntu.com/3991-1/
31
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
fixed_packages
0
url pkg:alpm/archlinux/thunderbird@60.7.0-1
purl pkg:alpm/archlinux/thunderbird@60.7.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1x4b-p9es-u7fj
1
vulnerability VCID-ckth-a939-dydh
2
vulnerability VCID-dk34-s8e2-uya4
3
vulnerability VCID-m6hy-v2x8-e3b5
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/thunderbird@60.7.0-1
aliases CVE-2019-11691
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k321-r7qq-gbb9
4
url VCID-k8nw-bn74-6qe5
vulnerability_id VCID-k8nw-bn74-6qe5
summary
Multiple vulnerabilities have been found in Chromium, the worst of
    which could result in the remote execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5798.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5798.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-5798
reference_id
reference_type
scores
0
value 0.01255
scoring_system epss
scoring_elements 0.79398
published_at 2026-04-18T12:55:00Z
1
value 0.01255
scoring_system epss
scoring_elements 0.79395
published_at 2026-04-11T12:55:00Z
2
value 0.01255
scoring_system epss
scoring_elements 0.79379
published_at 2026-04-12T12:55:00Z
3
value 0.01255
scoring_system epss
scoring_elements 0.79368
published_at 2026-04-13T12:55:00Z
4
value 0.01255
scoring_system epss
scoring_elements 0.794
published_at 2026-04-16T12:55:00Z
5
value 0.01255
scoring_system epss
scoring_elements 0.7932
published_at 2026-04-01T12:55:00Z
6
value 0.01255
scoring_system epss
scoring_elements 0.79327
published_at 2026-04-02T12:55:00Z
7
value 0.01255
scoring_system epss
scoring_elements 0.7935
published_at 2026-04-04T12:55:00Z
8
value 0.01255
scoring_system epss
scoring_elements 0.79336
published_at 2026-04-07T12:55:00Z
9
value 0.01255
scoring_system epss
scoring_elements 0.79362
published_at 2026-04-08T12:55:00Z
10
value 0.01255
scoring_system epss
scoring_elements 0.79371
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-5798
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5787
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5788
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5789
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5790
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5791
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5792
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5793
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5794
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5795
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5796
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5797
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5799
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5800
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5802
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5803
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5844
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5845
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5846
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1688200
reference_id 1688200
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1688200
34
reference_url https://security.archlinux.org/ASA-201903-8
reference_id ASA-201903-8
reference_type
scores
url https://security.archlinux.org/ASA-201903-8
35
reference_url https://security.archlinux.org/ASA-201905-8
reference_id ASA-201905-8
reference_type
scores
url https://security.archlinux.org/ASA-201905-8
36
reference_url https://security.archlinux.org/AVG-923
reference_id AVG-923
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-923
37
reference_url https://security.archlinux.org/AVG-965
reference_id AVG-965
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-965
38
reference_url https://security.gentoo.org/glsa/201903-23
reference_id GLSA-201903-23
reference_type
scores
url https://security.gentoo.org/glsa/201903-23
39
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
40
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
41
reference_url https://access.redhat.com/errata/RHSA-2019:0708
reference_id RHSA-2019:0708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0708
42
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
43
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
44
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
45
reference_url https://access.redhat.com/errata/RHSA-2019:1308
reference_id RHSA-2019:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1308
46
reference_url https://access.redhat.com/errata/RHSA-2019:1309
reference_id RHSA-2019:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1309
47
reference_url https://access.redhat.com/errata/RHSA-2019:1310
reference_id RHSA-2019:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1310
48
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
fixed_packages
0
url pkg:alpm/archlinux/thunderbird@60.7.0-1
purl pkg:alpm/archlinux/thunderbird@60.7.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1x4b-p9es-u7fj
1
vulnerability VCID-ckth-a939-dydh
2
vulnerability VCID-dk34-s8e2-uya4
3
vulnerability VCID-m6hy-v2x8-e3b5
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/thunderbird@60.7.0-1
aliases CVE-2019-5798
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k8nw-bn74-6qe5
5
url VCID-shp3-hrvu-9kcp
vulnerability_id VCID-shp3-hrvu-9kcp
summary Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none
references
0
reference_url https://security.archlinux.org/ASA-201905-8
reference_id ASA-201905-8
reference_type
scores
url https://security.archlinux.org/ASA-201905-8
1
reference_url https://security.archlinux.org/AVG-965
reference_id AVG-965
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-965
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-18511
reference_id CVE-2019-18511
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2019-18511
fixed_packages
0
url pkg:alpm/archlinux/thunderbird@60.7.0-1
purl pkg:alpm/archlinux/thunderbird@60.7.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1x4b-p9es-u7fj
1
vulnerability VCID-ckth-a939-dydh
2
vulnerability VCID-dk34-s8e2-uya4
3
vulnerability VCID-m6hy-v2x8-e3b5
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/thunderbird@60.7.0-1
aliases CVE-2019-18511
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-shp3-hrvu-9kcp
6
url VCID-sq1u-5jfc-dyh1
vulnerability_id VCID-sq1u-5jfc-dyh1
summary A possible vulnerability exists where type confusion can occur when manipulating JavaScript objects in object groups, allowing for the bypassing of security checks within these groups. *Note: this vulnerability has only been demonstrated with UnboxedObjects, which are disabled by default on all supported releases.*
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9816.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9816.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9816
reference_id
reference_type
scores
0
value 0.38245
scoring_system epss
scoring_elements 0.97237
published_at 2026-04-18T12:55:00Z
1
value 0.38245
scoring_system epss
scoring_elements 0.97221
published_at 2026-04-08T12:55:00Z
2
value 0.38245
scoring_system epss
scoring_elements 0.97222
published_at 2026-04-09T12:55:00Z
3
value 0.38245
scoring_system epss
scoring_elements 0.97225
published_at 2026-04-11T12:55:00Z
4
value 0.38245
scoring_system epss
scoring_elements 0.97226
published_at 2026-04-12T12:55:00Z
5
value 0.38245
scoring_system epss
scoring_elements 0.97227
published_at 2026-04-13T12:55:00Z
6
value 0.38245
scoring_system epss
scoring_elements 0.97235
published_at 2026-04-16T12:55:00Z
7
value 0.38245
scoring_system epss
scoring_elements 0.97199
published_at 2026-04-01T12:55:00Z
8
value 0.38245
scoring_system epss
scoring_elements 0.97205
published_at 2026-04-02T12:55:00Z
9
value 0.38245
scoring_system epss
scoring_elements 0.9721
published_at 2026-04-04T12:55:00Z
10
value 0.38245
scoring_system epss
scoring_elements 0.97211
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9816
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1712625
reference_id 1712625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1712625
17
reference_url https://security.archlinux.org/ASA-201905-8
reference_id ASA-201905-8
reference_type
scores
url https://security.archlinux.org/ASA-201905-8
18
reference_url https://security.archlinux.org/ASA-201905-9
reference_id ASA-201905-9
reference_type
scores
url https://security.archlinux.org/ASA-201905-9
19
reference_url https://security.archlinux.org/AVG-965
reference_id AVG-965
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-965
20
reference_url https://security.archlinux.org/AVG-966
reference_id AVG-966
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-966
21
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1808
reference_id CVE-2019-9816
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1808
22
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46940.txt
reference_id CVE-2019-9816
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46940.txt
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
reference_id mfsa2019-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
25
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
26
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
27
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
28
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
29
reference_url https://usn.ubuntu.com/3991-1/
reference_id USN-3991-1
reference_type
scores
url https://usn.ubuntu.com/3991-1/
30
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
fixed_packages
0
url pkg:alpm/archlinux/thunderbird@60.7.0-1
purl pkg:alpm/archlinux/thunderbird@60.7.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1x4b-p9es-u7fj
1
vulnerability VCID-ckth-a939-dydh
2
vulnerability VCID-dk34-s8e2-uya4
3
vulnerability VCID-m6hy-v2x8-e3b5
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/thunderbird@60.7.0-1
aliases CVE-2019-9816
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sq1u-5jfc-dyh1
7
url VCID-tfry-ch3y-fyb1
vulnerability_id VCID-tfry-ch3y-fyb1
summary Mozilla developers and community members Olli Pettay, Bogdan Tara, Jan de Mooij, Jason Kratzer, Jan Varga, Gary Kwong, Tim Guan-tin Chien, Tyson Smith, Ronald Crane, and Ted Campbell reported memory safety bugs present in Firefox 66 and Firefox ESR 60.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9800.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9800.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9800
reference_id
reference_type
scores
0
value 0.00554
scoring_system epss
scoring_elements 0.68126
published_at 2026-04-18T12:55:00Z
1
value 0.00554
scoring_system epss
scoring_elements 0.68085
published_at 2026-04-08T12:55:00Z
2
value 0.00554
scoring_system epss
scoring_elements 0.68099
published_at 2026-04-09T12:55:00Z
3
value 0.00554
scoring_system epss
scoring_elements 0.68124
published_at 2026-04-11T12:55:00Z
4
value 0.00554
scoring_system epss
scoring_elements 0.68111
published_at 2026-04-12T12:55:00Z
5
value 0.00554
scoring_system epss
scoring_elements 0.68077
published_at 2026-04-13T12:55:00Z
6
value 0.00554
scoring_system epss
scoring_elements 0.68114
published_at 2026-04-16T12:55:00Z
7
value 0.00554
scoring_system epss
scoring_elements 0.68014
published_at 2026-04-01T12:55:00Z
8
value 0.00554
scoring_system epss
scoring_elements 0.68035
published_at 2026-04-02T12:55:00Z
9
value 0.00554
scoring_system epss
scoring_elements 0.68055
published_at 2026-04-04T12:55:00Z
10
value 0.00554
scoring_system epss
scoring_elements 0.68033
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9800
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1712623
reference_id 1712623
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1712623
17
reference_url https://security.archlinux.org/ASA-201905-8
reference_id ASA-201905-8
reference_type
scores
url https://security.archlinux.org/ASA-201905-8
18
reference_url https://security.archlinux.org/ASA-201905-9
reference_id ASA-201905-9
reference_type
scores
url https://security.archlinux.org/ASA-201905-9
19
reference_url https://security.archlinux.org/AVG-965
reference_id AVG-965
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-965
20
reference_url https://security.archlinux.org/AVG-966
reference_id AVG-966
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-966
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
reference_id mfsa2019-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
24
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
25
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
26
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
27
reference_url https://access.redhat.com/errata/RHSA-2019:1308
reference_id RHSA-2019:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1308
28
reference_url https://access.redhat.com/errata/RHSA-2019:1309
reference_id RHSA-2019:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1309
29
reference_url https://access.redhat.com/errata/RHSA-2019:1310
reference_id RHSA-2019:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1310
30
reference_url https://usn.ubuntu.com/3991-1/
reference_id USN-3991-1
reference_type
scores
url https://usn.ubuntu.com/3991-1/
31
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
fixed_packages
0
url pkg:alpm/archlinux/thunderbird@60.7.0-1
purl pkg:alpm/archlinux/thunderbird@60.7.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1x4b-p9es-u7fj
1
vulnerability VCID-ckth-a939-dydh
2
vulnerability VCID-dk34-s8e2-uya4
3
vulnerability VCID-m6hy-v2x8-e3b5
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/thunderbird@60.7.0-1
aliases CVE-2019-9800
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tfry-ch3y-fyb1
8
url VCID-ugjs-4tca-d3dk
vulnerability_id VCID-ugjs-4tca-d3dk
summary The bufferdata function in WebGL is vulnerable to a buffer overflow with specific graphics drivers on Linux. This could result in malicious content freezing a tab or triggering a potentially exploitable crash. *Note: this issue only occurs on Linux. Other operating systems are unaffected.*
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11693.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11693.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11693
reference_id
reference_type
scores
0
value 0.00598
scoring_system epss
scoring_elements 0.69451
published_at 2026-04-18T12:55:00Z
1
value 0.00598
scoring_system epss
scoring_elements 0.69392
published_at 2026-04-08T12:55:00Z
2
value 0.00598
scoring_system epss
scoring_elements 0.69408
published_at 2026-04-09T12:55:00Z
3
value 0.00598
scoring_system epss
scoring_elements 0.6943
published_at 2026-04-11T12:55:00Z
4
value 0.00598
scoring_system epss
scoring_elements 0.69415
published_at 2026-04-12T12:55:00Z
5
value 0.00598
scoring_system epss
scoring_elements 0.69401
published_at 2026-04-13T12:55:00Z
6
value 0.00598
scoring_system epss
scoring_elements 0.6944
published_at 2026-04-16T12:55:00Z
7
value 0.00598
scoring_system epss
scoring_elements 0.69333
published_at 2026-04-01T12:55:00Z
8
value 0.00598
scoring_system epss
scoring_elements 0.69345
published_at 2026-04-02T12:55:00Z
9
value 0.00598
scoring_system epss
scoring_elements 0.69362
published_at 2026-04-04T12:55:00Z
10
value 0.00598
scoring_system epss
scoring_elements 0.69342
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11693
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1712619
reference_id 1712619
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1712619
17
reference_url https://security.archlinux.org/ASA-201905-8
reference_id ASA-201905-8
reference_type
scores
url https://security.archlinux.org/ASA-201905-8
18
reference_url https://security.archlinux.org/ASA-201905-9
reference_id ASA-201905-9
reference_type
scores
url https://security.archlinux.org/ASA-201905-9
19
reference_url https://security.archlinux.org/AVG-965
reference_id AVG-965
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-965
20
reference_url https://security.archlinux.org/AVG-966
reference_id AVG-966
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-966
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
reference_id mfsa2019-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
24
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
25
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
26
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
27
reference_url https://access.redhat.com/errata/RHSA-2019:1308
reference_id RHSA-2019:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1308
28
reference_url https://access.redhat.com/errata/RHSA-2019:1309
reference_id RHSA-2019:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1309
29
reference_url https://access.redhat.com/errata/RHSA-2019:1310
reference_id RHSA-2019:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1310
30
reference_url https://usn.ubuntu.com/3991-1/
reference_id USN-3991-1
reference_type
scores
url https://usn.ubuntu.com/3991-1/
31
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
fixed_packages
0
url pkg:alpm/archlinux/thunderbird@60.7.0-1
purl pkg:alpm/archlinux/thunderbird@60.7.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1x4b-p9es-u7fj
1
vulnerability VCID-ckth-a939-dydh
2
vulnerability VCID-dk34-s8e2-uya4
3
vulnerability VCID-m6hy-v2x8-e3b5
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/thunderbird@60.7.0-1
aliases CVE-2019-11693
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ugjs-4tca-d3dk
9
url VCID-vvpm-3zhz-77dm
vulnerability_id VCID-vvpm-3zhz-77dm
summary A use-after-free vulnerability can occur when listeners are removed from the event listener manager while still in use, resulting in a potentially exploitable crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11692.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11692.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11692
reference_id
reference_type
scores
0
value 0.00516
scoring_system epss
scoring_elements 0.66694
published_at 2026-04-18T12:55:00Z
1
value 0.00516
scoring_system epss
scoring_elements 0.66657
published_at 2026-04-08T12:55:00Z
2
value 0.00516
scoring_system epss
scoring_elements 0.66671
published_at 2026-04-09T12:55:00Z
3
value 0.00516
scoring_system epss
scoring_elements 0.6669
published_at 2026-04-11T12:55:00Z
4
value 0.00516
scoring_system epss
scoring_elements 0.66678
published_at 2026-04-12T12:55:00Z
5
value 0.00516
scoring_system epss
scoring_elements 0.66645
published_at 2026-04-13T12:55:00Z
6
value 0.00516
scoring_system epss
scoring_elements 0.6668
published_at 2026-04-16T12:55:00Z
7
value 0.00516
scoring_system epss
scoring_elements 0.66572
published_at 2026-04-01T12:55:00Z
8
value 0.00516
scoring_system epss
scoring_elements 0.66611
published_at 2026-04-02T12:55:00Z
9
value 0.00516
scoring_system epss
scoring_elements 0.66638
published_at 2026-04-04T12:55:00Z
10
value 0.00516
scoring_system epss
scoring_elements 0.66609
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11692
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1712618
reference_id 1712618
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1712618
17
reference_url https://security.archlinux.org/ASA-201905-8
reference_id ASA-201905-8
reference_type
scores
url https://security.archlinux.org/ASA-201905-8
18
reference_url https://security.archlinux.org/ASA-201905-9
reference_id ASA-201905-9
reference_type
scores
url https://security.archlinux.org/ASA-201905-9
19
reference_url https://security.archlinux.org/AVG-965
reference_id AVG-965
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-965
20
reference_url https://security.archlinux.org/AVG-966
reference_id AVG-966
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-966
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
reference_id mfsa2019-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
24
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
25
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
26
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
27
reference_url https://access.redhat.com/errata/RHSA-2019:1308
reference_id RHSA-2019:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1308
28
reference_url https://access.redhat.com/errata/RHSA-2019:1309
reference_id RHSA-2019:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1309
29
reference_url https://access.redhat.com/errata/RHSA-2019:1310
reference_id RHSA-2019:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1310
30
reference_url https://usn.ubuntu.com/3991-1/
reference_id USN-3991-1
reference_type
scores
url https://usn.ubuntu.com/3991-1/
31
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
fixed_packages
0
url pkg:alpm/archlinux/thunderbird@60.7.0-1
purl pkg:alpm/archlinux/thunderbird@60.7.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1x4b-p9es-u7fj
1
vulnerability VCID-ckth-a939-dydh
2
vulnerability VCID-dk34-s8e2-uya4
3
vulnerability VCID-m6hy-v2x8-e3b5
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/thunderbird@60.7.0-1
aliases CVE-2019-11692
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vvpm-3zhz-77dm
10
url VCID-w5hu-w7mu-b3g3
vulnerability_id VCID-w5hu-w7mu-b3g3
summary If a crafted hyperlink is dragged and dropped to the bookmark bar or sidebar and the resulting bookmark is subsequently dragged and dropped into the web content area, an arbitrary query of a user's browser history can be run and transmitted to the content page via drop event data. This allows for the theft of browser history by a malicious site.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11698.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11698.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11698
reference_id
reference_type
scores
0
value 0.00379
scoring_system epss
scoring_elements 0.59477
published_at 2026-04-18T12:55:00Z
1
value 0.00379
scoring_system epss
scoring_elements 0.5944
published_at 2026-04-08T12:55:00Z
2
value 0.00379
scoring_system epss
scoring_elements 0.59453
published_at 2026-04-09T12:55:00Z
3
value 0.00379
scoring_system epss
scoring_elements 0.59472
published_at 2026-04-11T12:55:00Z
4
value 0.00379
scoring_system epss
scoring_elements 0.59456
published_at 2026-04-12T12:55:00Z
5
value 0.00379
scoring_system epss
scoring_elements 0.59437
published_at 2026-04-13T12:55:00Z
6
value 0.00379
scoring_system epss
scoring_elements 0.5947
published_at 2026-04-16T12:55:00Z
7
value 0.00379
scoring_system epss
scoring_elements 0.59326
published_at 2026-04-01T12:55:00Z
8
value 0.00379
scoring_system epss
scoring_elements 0.59399
published_at 2026-04-02T12:55:00Z
9
value 0.00379
scoring_system epss
scoring_elements 0.59423
published_at 2026-04-04T12:55:00Z
10
value 0.00379
scoring_system epss
scoring_elements 0.59389
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11698
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1712621
reference_id 1712621
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1712621
17
reference_url https://security.archlinux.org/ASA-201905-8
reference_id ASA-201905-8
reference_type
scores
url https://security.archlinux.org/ASA-201905-8
18
reference_url https://security.archlinux.org/ASA-201905-9
reference_id ASA-201905-9
reference_type
scores
url https://security.archlinux.org/ASA-201905-9
19
reference_url https://security.archlinux.org/AVG-965
reference_id AVG-965
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-965
20
reference_url https://security.archlinux.org/AVG-966
reference_id AVG-966
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-966
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
reference_id mfsa2019-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
24
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
25
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
26
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
27
reference_url https://access.redhat.com/errata/RHSA-2019:1308
reference_id RHSA-2019:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1308
28
reference_url https://access.redhat.com/errata/RHSA-2019:1309
reference_id RHSA-2019:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1309
29
reference_url https://access.redhat.com/errata/RHSA-2019:1310
reference_id RHSA-2019:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1310
30
reference_url https://usn.ubuntu.com/3991-1/
reference_id USN-3991-1
reference_type
scores
url https://usn.ubuntu.com/3991-1/
31
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
fixed_packages
0
url pkg:alpm/archlinux/thunderbird@60.7.0-1
purl pkg:alpm/archlinux/thunderbird@60.7.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1x4b-p9es-u7fj
1
vulnerability VCID-ckth-a939-dydh
2
vulnerability VCID-dk34-s8e2-uya4
3
vulnerability VCID-m6hy-v2x8-e3b5
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/thunderbird@60.7.0-1
aliases CVE-2019-11698
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w5hu-w7mu-b3g3
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/thunderbird@60.7.0-1