Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/firefox@108.0-1?distro=sid
Typedeb
Namespacedebian
Namefirefox
Version108.0-1
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version109.0-1
Latest_non_vulnerable_version150.0.1-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-aquh-9cjg-wyey
vulnerability_id VCID-aquh-9cjg-wyey
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46877.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46877.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46877
reference_id
reference_type
scores
0
value 0.00483
scoring_system epss
scoring_elements 0.65193
published_at 2026-04-07T12:55:00Z
1
value 0.00483
scoring_system epss
scoring_elements 0.65268
published_at 2026-04-16T12:55:00Z
2
value 0.00483
scoring_system epss
scoring_elements 0.65233
published_at 2026-04-13T12:55:00Z
3
value 0.00483
scoring_system epss
scoring_elements 0.65261
published_at 2026-04-21T12:55:00Z
4
value 0.00483
scoring_system epss
scoring_elements 0.65273
published_at 2026-04-11T12:55:00Z
5
value 0.00483
scoring_system epss
scoring_elements 0.65255
published_at 2026-04-09T12:55:00Z
6
value 0.00483
scoring_system epss
scoring_elements 0.65243
published_at 2026-04-08T12:55:00Z
7
value 0.00483
scoring_system epss
scoring_elements 0.65227
published_at 2026-04-04T12:55:00Z
8
value 0.00483
scoring_system epss
scoring_elements 0.65202
published_at 2026-04-02T12:55:00Z
9
value 0.00483
scoring_system epss
scoring_elements 0.65278
published_at 2026-04-18T12:55:00Z
10
value 0.00515
scoring_system epss
scoring_elements 0.66665
published_at 2026-04-29T12:55:00Z
11
value 0.00515
scoring_system epss
scoring_elements 0.66651
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46877
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162342
reference_id 2162342
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162342
23
reference_url https://www.debian.org/security/2023/dsa-5322
reference_id dsa-5322
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/
url https://www.debian.org/security/2023/dsa-5322
24
reference_url https://www.debian.org/security/2023/dsa-5355
reference_id dsa-5355
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/
url https://www.debian.org/security/2023/dsa-5355
25
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/
url https://security.gentoo.org/glsa/202305-06
26
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/
url https://security.gentoo.org/glsa/202305-13
27
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
reference_id mfsa2022-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
28
reference_url https://www.mozilla.org/security/advisories/mfsa2022-51/
reference_id mfsa2022-51
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/
url https://www.mozilla.org/security/advisories/mfsa2022-51/
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-02
reference_id mfsa2023-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-02
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-03
reference_id mfsa2023-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-03
31
reference_url https://lists.debian.org/debian-lts-announce/2023/01/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/
url https://lists.debian.org/debian-lts-announce/2023/01/msg00015.html
32
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00018.html
33
reference_url https://access.redhat.com/errata/RHSA-2023:0285
reference_id RHSA-2023:0285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0285
34
reference_url https://access.redhat.com/errata/RHSA-2023:0286
reference_id RHSA-2023:0286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0286
35
reference_url https://access.redhat.com/errata/RHSA-2023:0288
reference_id RHSA-2023:0288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0288
36
reference_url https://access.redhat.com/errata/RHSA-2023:0289
reference_id RHSA-2023:0289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0289
37
reference_url https://access.redhat.com/errata/RHSA-2023:0290
reference_id RHSA-2023:0290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0290
38
reference_url https://access.redhat.com/errata/RHSA-2023:0294
reference_id RHSA-2023:0294
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0294
39
reference_url https://access.redhat.com/errata/RHSA-2023:0295
reference_id RHSA-2023:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0295
40
reference_url https://access.redhat.com/errata/RHSA-2023:0296
reference_id RHSA-2023:0296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0296
41
reference_url https://access.redhat.com/errata/RHSA-2023:0456
reference_id RHSA-2023:0456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0456
42
reference_url https://access.redhat.com/errata/RHSA-2023:0457
reference_id RHSA-2023:0457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0457
43
reference_url https://access.redhat.com/errata/RHSA-2023:0459
reference_id RHSA-2023:0459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0459
44
reference_url https://access.redhat.com/errata/RHSA-2023:0460
reference_id RHSA-2023:0460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0460
45
reference_url https://access.redhat.com/errata/RHSA-2023:0461
reference_id RHSA-2023:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0461
46
reference_url https://access.redhat.com/errata/RHSA-2023:0462
reference_id RHSA-2023:0462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0462
47
reference_url https://access.redhat.com/errata/RHSA-2023:0463
reference_id RHSA-2023:0463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0463
48
reference_url https://access.redhat.com/errata/RHSA-2023:0476
reference_id RHSA-2023:0476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0476
49
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1795139
reference_id show_bug.cgi?id=1795139
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1795139
50
reference_url https://usn.ubuntu.com/5782-1/
reference_id USN-5782-1
reference_type
scores
url https://usn.ubuntu.com/5782-1/
51
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:deb/debian/firefox@108.0-1?distro=sid
purl pkg:deb/debian/firefox@108.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@108.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
aliases CVE-2022-46877
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aquh-9cjg-wyey
1
url VCID-e4nx-qfam-cfaj
vulnerability_id VCID-e4nx-qfam-cfaj
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46872.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46872.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46872
reference_id
reference_type
scores
0
value 0.00316
scoring_system epss
scoring_elements 0.54744
published_at 2026-04-18T12:55:00Z
1
value 0.00316
scoring_system epss
scoring_elements 0.54704
published_at 2026-04-13T12:55:00Z
2
value 0.00316
scoring_system epss
scoring_elements 0.54689
published_at 2026-04-02T12:55:00Z
3
value 0.00316
scoring_system epss
scoring_elements 0.54711
published_at 2026-04-04T12:55:00Z
4
value 0.00316
scoring_system epss
scoring_elements 0.54681
published_at 2026-04-07T12:55:00Z
5
value 0.00316
scoring_system epss
scoring_elements 0.54733
published_at 2026-04-08T12:55:00Z
6
value 0.00316
scoring_system epss
scoring_elements 0.54729
published_at 2026-04-09T12:55:00Z
7
value 0.00316
scoring_system epss
scoring_elements 0.54725
published_at 2026-04-21T12:55:00Z
8
value 0.00316
scoring_system epss
scoring_elements 0.54742
published_at 2026-04-16T12:55:00Z
9
value 0.00337
scoring_system epss
scoring_elements 0.56493
published_at 2026-04-29T12:55:00Z
10
value 0.00337
scoring_system epss
scoring_elements 0.56494
published_at 2026-04-24T12:55:00Z
11
value 0.00337
scoring_system epss
scoring_elements 0.56513
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46872
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153441
reference_id 2153441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153441
10
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
11
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
reference_id mfsa2022-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
reference_id mfsa2022-53
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
15
reference_url https://access.redhat.com/errata/RHSA-2022:9065
reference_id RHSA-2022:9065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9065
16
reference_url https://access.redhat.com/errata/RHSA-2022:9066
reference_id RHSA-2022:9066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9066
17
reference_url https://access.redhat.com/errata/RHSA-2022:9067
reference_id RHSA-2022:9067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9067
18
reference_url https://access.redhat.com/errata/RHSA-2022:9068
reference_id RHSA-2022:9068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9068
19
reference_url https://access.redhat.com/errata/RHSA-2022:9069
reference_id RHSA-2022:9069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9069
20
reference_url https://access.redhat.com/errata/RHSA-2022:9070
reference_id RHSA-2022:9070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9070
21
reference_url https://access.redhat.com/errata/RHSA-2022:9071
reference_id RHSA-2022:9071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9071
22
reference_url https://access.redhat.com/errata/RHSA-2022:9072
reference_id RHSA-2022:9072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9072
23
reference_url https://access.redhat.com/errata/RHSA-2022:9074
reference_id RHSA-2022:9074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9074
24
reference_url https://access.redhat.com/errata/RHSA-2022:9075
reference_id RHSA-2022:9075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9075
25
reference_url https://access.redhat.com/errata/RHSA-2022:9076
reference_id RHSA-2022:9076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9076
26
reference_url https://access.redhat.com/errata/RHSA-2022:9077
reference_id RHSA-2022:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9077
27
reference_url https://access.redhat.com/errata/RHSA-2022:9078
reference_id RHSA-2022:9078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9078
28
reference_url https://access.redhat.com/errata/RHSA-2022:9079
reference_id RHSA-2022:9079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9079
29
reference_url https://access.redhat.com/errata/RHSA-2022:9080
reference_id RHSA-2022:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9080
30
reference_url https://access.redhat.com/errata/RHSA-2022:9081
reference_id RHSA-2022:9081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9081
31
reference_url https://usn.ubuntu.com/5782-1/
reference_id USN-5782-1
reference_type
scores
url https://usn.ubuntu.com/5782-1/
32
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:deb/debian/firefox@108.0-1?distro=sid
purl pkg:deb/debian/firefox@108.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@108.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
aliases CVE-2022-46872
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e4nx-qfam-cfaj
2
url VCID-hp32-swmr-qqdy
vulnerability_id VCID-hp32-swmr-qqdy
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46878.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46878.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46878
reference_id
reference_type
scores
0
value 0.00352
scoring_system epss
scoring_elements 0.5765
published_at 2026-04-21T12:55:00Z
1
value 0.00352
scoring_system epss
scoring_elements 0.57671
published_at 2026-04-18T12:55:00Z
2
value 0.00352
scoring_system epss
scoring_elements 0.57617
published_at 2026-04-02T12:55:00Z
3
value 0.00352
scoring_system epss
scoring_elements 0.57638
published_at 2026-04-04T12:55:00Z
4
value 0.00352
scoring_system epss
scoring_elements 0.57614
published_at 2026-04-07T12:55:00Z
5
value 0.00352
scoring_system epss
scoring_elements 0.57668
published_at 2026-04-08T12:55:00Z
6
value 0.00352
scoring_system epss
scoring_elements 0.57673
published_at 2026-04-09T12:55:00Z
7
value 0.00352
scoring_system epss
scoring_elements 0.57687
published_at 2026-04-11T12:55:00Z
8
value 0.00352
scoring_system epss
scoring_elements 0.57666
published_at 2026-04-12T12:55:00Z
9
value 0.00352
scoring_system epss
scoring_elements 0.57676
published_at 2026-04-16T12:55:00Z
10
value 0.00352
scoring_system epss
scoring_elements 0.57646
published_at 2026-04-13T12:55:00Z
11
value 0.00375
scoring_system epss
scoring_elements 0.59148
published_at 2026-04-29T12:55:00Z
12
value 0.00375
scoring_system epss
scoring_elements 0.59144
published_at 2026-04-24T12:55:00Z
13
value 0.00375
scoring_system epss
scoring_elements 0.59163
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46878
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153454
reference_id 2153454
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153454
10
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
11
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
reference_id mfsa2022-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
reference_id mfsa2022-53
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
15
reference_url https://access.redhat.com/errata/RHSA-2022:9065
reference_id RHSA-2022:9065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9065
16
reference_url https://access.redhat.com/errata/RHSA-2022:9066
reference_id RHSA-2022:9066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9066
17
reference_url https://access.redhat.com/errata/RHSA-2022:9067
reference_id RHSA-2022:9067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9067
18
reference_url https://access.redhat.com/errata/RHSA-2022:9068
reference_id RHSA-2022:9068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9068
19
reference_url https://access.redhat.com/errata/RHSA-2022:9069
reference_id RHSA-2022:9069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9069
20
reference_url https://access.redhat.com/errata/RHSA-2022:9070
reference_id RHSA-2022:9070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9070
21
reference_url https://access.redhat.com/errata/RHSA-2022:9071
reference_id RHSA-2022:9071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9071
22
reference_url https://access.redhat.com/errata/RHSA-2022:9072
reference_id RHSA-2022:9072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9072
23
reference_url https://access.redhat.com/errata/RHSA-2022:9074
reference_id RHSA-2022:9074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9074
24
reference_url https://access.redhat.com/errata/RHSA-2022:9075
reference_id RHSA-2022:9075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9075
25
reference_url https://access.redhat.com/errata/RHSA-2022:9076
reference_id RHSA-2022:9076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9076
26
reference_url https://access.redhat.com/errata/RHSA-2022:9077
reference_id RHSA-2022:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9077
27
reference_url https://access.redhat.com/errata/RHSA-2022:9078
reference_id RHSA-2022:9078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9078
28
reference_url https://access.redhat.com/errata/RHSA-2022:9079
reference_id RHSA-2022:9079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9079
29
reference_url https://access.redhat.com/errata/RHSA-2022:9080
reference_id RHSA-2022:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9080
30
reference_url https://access.redhat.com/errata/RHSA-2022:9081
reference_id RHSA-2022:9081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9081
31
reference_url https://usn.ubuntu.com/5782-1/
reference_id USN-5782-1
reference_type
scores
url https://usn.ubuntu.com/5782-1/
32
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:deb/debian/firefox@108.0-1?distro=sid
purl pkg:deb/debian/firefox@108.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@108.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
aliases CVE-2022-46878
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hp32-swmr-qqdy
3
url VCID-kfxp-azcd-2yej
vulnerability_id VCID-kfxp-azcd-2yej
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46871.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46871.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46871
reference_id
reference_type
scores
0
value 0.00931
scoring_system epss
scoring_elements 0.76064
published_at 2026-04-07T12:55:00Z
1
value 0.00931
scoring_system epss
scoring_elements 0.76137
published_at 2026-04-21T12:55:00Z
2
value 0.00931
scoring_system epss
scoring_elements 0.76154
published_at 2026-04-18T12:55:00Z
3
value 0.00931
scoring_system epss
scoring_elements 0.7615
published_at 2026-04-16T12:55:00Z
4
value 0.00931
scoring_system epss
scoring_elements 0.7611
published_at 2026-04-13T12:55:00Z
5
value 0.00931
scoring_system epss
scoring_elements 0.76112
published_at 2026-04-12T12:55:00Z
6
value 0.00931
scoring_system epss
scoring_elements 0.76136
published_at 2026-04-11T12:55:00Z
7
value 0.00931
scoring_system epss
scoring_elements 0.76111
published_at 2026-04-09T12:55:00Z
8
value 0.00931
scoring_system epss
scoring_elements 0.76097
published_at 2026-04-08T12:55:00Z
9
value 0.00931
scoring_system epss
scoring_elements 0.76083
published_at 2026-04-04T12:55:00Z
10
value 0.00931
scoring_system epss
scoring_elements 0.76051
published_at 2026-04-02T12:55:00Z
11
value 0.00991
scoring_system epss
scoring_elements 0.76969
published_at 2026-04-26T12:55:00Z
12
value 0.00991
scoring_system epss
scoring_elements 0.76981
published_at 2026-04-29T12:55:00Z
13
value 0.00991
scoring_system epss
scoring_elements 0.76962
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46871
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
22
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162336
reference_id 2162336
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162336
24
reference_url https://www.debian.org/security/2023/dsa-5322
reference_id dsa-5322
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/
url https://www.debian.org/security/2023/dsa-5322
25
reference_url https://www.debian.org/security/2023/dsa-5355
reference_id dsa-5355
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/
url https://www.debian.org/security/2023/dsa-5355
26
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/
url https://security.gentoo.org/glsa/202305-06
27
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/
url https://security.gentoo.org/glsa/202305-13
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
reference_id mfsa2022-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
29
reference_url https://www.mozilla.org/security/advisories/mfsa2022-51/
reference_id mfsa2022-51
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/
url https://www.mozilla.org/security/advisories/mfsa2022-51/
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-02
reference_id mfsa2023-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-02
31
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-03
reference_id mfsa2023-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-03
32
reference_url https://lists.debian.org/debian-lts-announce/2023/01/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/
url https://lists.debian.org/debian-lts-announce/2023/01/msg00015.html
33
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00018.html
34
reference_url https://access.redhat.com/errata/RHSA-2023:0285
reference_id RHSA-2023:0285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0285
35
reference_url https://access.redhat.com/errata/RHSA-2023:0286
reference_id RHSA-2023:0286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0286
36
reference_url https://access.redhat.com/errata/RHSA-2023:0288
reference_id RHSA-2023:0288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0288
37
reference_url https://access.redhat.com/errata/RHSA-2023:0289
reference_id RHSA-2023:0289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0289
38
reference_url https://access.redhat.com/errata/RHSA-2023:0290
reference_id RHSA-2023:0290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0290
39
reference_url https://access.redhat.com/errata/RHSA-2023:0294
reference_id RHSA-2023:0294
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0294
40
reference_url https://access.redhat.com/errata/RHSA-2023:0295
reference_id RHSA-2023:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0295
41
reference_url https://access.redhat.com/errata/RHSA-2023:0296
reference_id RHSA-2023:0296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0296
42
reference_url https://access.redhat.com/errata/RHSA-2023:0456
reference_id RHSA-2023:0456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0456
43
reference_url https://access.redhat.com/errata/RHSA-2023:0457
reference_id RHSA-2023:0457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0457
44
reference_url https://access.redhat.com/errata/RHSA-2023:0459
reference_id RHSA-2023:0459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0459
45
reference_url https://access.redhat.com/errata/RHSA-2023:0460
reference_id RHSA-2023:0460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0460
46
reference_url https://access.redhat.com/errata/RHSA-2023:0461
reference_id RHSA-2023:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0461
47
reference_url https://access.redhat.com/errata/RHSA-2023:0462
reference_id RHSA-2023:0462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0462
48
reference_url https://access.redhat.com/errata/RHSA-2023:0463
reference_id RHSA-2023:0463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0463
49
reference_url https://access.redhat.com/errata/RHSA-2023:0476
reference_id RHSA-2023:0476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0476
50
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1795697
reference_id show_bug.cgi?id=1795697
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1795697
51
reference_url https://usn.ubuntu.com/5782-1/
reference_id USN-5782-1
reference_type
scores
url https://usn.ubuntu.com/5782-1/
52
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:deb/debian/firefox@108.0-1?distro=sid
purl pkg:deb/debian/firefox@108.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@108.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
aliases CVE-2022-46871
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kfxp-azcd-2yej
4
url VCID-r9rc-27rr-13h6
vulnerability_id VCID-r9rc-27rr-13h6
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46879
reference_id
reference_type
scores
0
value 0.00373
scoring_system epss
scoring_elements 0.59026
published_at 2026-04-29T12:55:00Z
1
value 0.00373
scoring_system epss
scoring_elements 0.59039
published_at 2026-04-26T12:55:00Z
2
value 0.00531
scoring_system epss
scoring_elements 0.6725
published_at 2026-04-04T12:55:00Z
3
value 0.00531
scoring_system epss
scoring_elements 0.67227
published_at 2026-04-07T12:55:00Z
4
value 0.00531
scoring_system epss
scoring_elements 0.67278
published_at 2026-04-08T12:55:00Z
5
value 0.00531
scoring_system epss
scoring_elements 0.67291
published_at 2026-04-09T12:55:00Z
6
value 0.00531
scoring_system epss
scoring_elements 0.67311
published_at 2026-04-11T12:55:00Z
7
value 0.00531
scoring_system epss
scoring_elements 0.67263
published_at 2026-04-13T12:55:00Z
8
value 0.00531
scoring_system epss
scoring_elements 0.6731
published_at 2026-04-18T12:55:00Z
9
value 0.00531
scoring_system epss
scoring_elements 0.67289
published_at 2026-04-21T12:55:00Z
10
value 0.00531
scoring_system epss
scoring_elements 0.67298
published_at 2026-04-16T12:55:00Z
11
value 0.00531
scoring_system epss
scoring_elements 0.67226
published_at 2026-04-02T12:55:00Z
12
value 0.00566
scoring_system epss
scoring_elements 0.68526
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46879
1
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
reference_id mfsa2022-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
3
reference_url https://usn.ubuntu.com/5782-1/
reference_id USN-5782-1
reference_type
scores
url https://usn.ubuntu.com/5782-1/
fixed_packages
0
url pkg:deb/debian/firefox@108.0-1?distro=sid
purl pkg:deb/debian/firefox@108.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@108.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
aliases CVE-2022-46879
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r9rc-27rr-13h6
5
url VCID-tf6z-7brv-dybw
vulnerability_id VCID-tf6z-7brv-dybw
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46873
reference_id
reference_type
scores
0
value 0.00596
scoring_system epss
scoring_elements 0.69356
published_at 2026-04-21T12:55:00Z
1
value 0.00596
scoring_system epss
scoring_elements 0.69285
published_at 2026-04-02T12:55:00Z
2
value 0.00596
scoring_system epss
scoring_elements 0.69302
published_at 2026-04-04T12:55:00Z
3
value 0.00596
scoring_system epss
scoring_elements 0.69282
published_at 2026-04-07T12:55:00Z
4
value 0.00596
scoring_system epss
scoring_elements 0.69332
published_at 2026-04-08T12:55:00Z
5
value 0.00596
scoring_system epss
scoring_elements 0.69349
published_at 2026-04-09T12:55:00Z
6
value 0.00596
scoring_system epss
scoring_elements 0.69371
published_at 2026-04-11T12:55:00Z
7
value 0.00596
scoring_system epss
scoring_elements 0.69355
published_at 2026-04-12T12:55:00Z
8
value 0.00596
scoring_system epss
scoring_elements 0.69327
published_at 2026-04-13T12:55:00Z
9
value 0.00596
scoring_system epss
scoring_elements 0.69365
published_at 2026-04-16T12:55:00Z
10
value 0.00596
scoring_system epss
scoring_elements 0.69375
published_at 2026-04-18T12:55:00Z
11
value 0.00634
scoring_system epss
scoring_elements 0.70475
published_at 2026-04-29T12:55:00Z
12
value 0.00634
scoring_system epss
scoring_elements 0.70466
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46873
1
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
reference_id mfsa2022-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
3
reference_url https://usn.ubuntu.com/5782-1/
reference_id USN-5782-1
reference_type
scores
url https://usn.ubuntu.com/5782-1/
fixed_packages
0
url pkg:deb/debian/firefox@108.0-1?distro=sid
purl pkg:deb/debian/firefox@108.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@108.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
aliases CVE-2022-46873
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tf6z-7brv-dybw
6
url VCID-yxy6-s185-myc9
vulnerability_id VCID-yxy6-s185-myc9
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46874.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46874.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46874
reference_id
reference_type
scores
0
value 0.00378
scoring_system epss
scoring_elements 0.59387
published_at 2026-04-21T12:55:00Z
1
value 0.00378
scoring_system epss
scoring_elements 0.59405
published_at 2026-04-18T12:55:00Z
2
value 0.00378
scoring_system epss
scoring_elements 0.5933
published_at 2026-04-02T12:55:00Z
3
value 0.00378
scoring_system epss
scoring_elements 0.59353
published_at 2026-04-04T12:55:00Z
4
value 0.00378
scoring_system epss
scoring_elements 0.59318
published_at 2026-04-07T12:55:00Z
5
value 0.00378
scoring_system epss
scoring_elements 0.59368
published_at 2026-04-08T12:55:00Z
6
value 0.00378
scoring_system epss
scoring_elements 0.59382
published_at 2026-04-09T12:55:00Z
7
value 0.00378
scoring_system epss
scoring_elements 0.59401
published_at 2026-04-11T12:55:00Z
8
value 0.00378
scoring_system epss
scoring_elements 0.59384
published_at 2026-04-12T12:55:00Z
9
value 0.00378
scoring_system epss
scoring_elements 0.59399
published_at 2026-04-16T12:55:00Z
10
value 0.00378
scoring_system epss
scoring_elements 0.59366
published_at 2026-04-13T12:55:00Z
11
value 0.00403
scoring_system epss
scoring_elements 0.60885
published_at 2026-04-29T12:55:00Z
12
value 0.00403
scoring_system epss
scoring_elements 0.6088
published_at 2026-04-24T12:55:00Z
13
value 0.00403
scoring_system epss
scoring_elements 0.60892
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46874
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153449
reference_id 2153449
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153449
10
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
11
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
reference_id mfsa2022-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-54
reference_id mfsa2022-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-54
15
reference_url https://access.redhat.com/errata/RHSA-2022:9065
reference_id RHSA-2022:9065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9065
16
reference_url https://access.redhat.com/errata/RHSA-2022:9066
reference_id RHSA-2022:9066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9066
17
reference_url https://access.redhat.com/errata/RHSA-2022:9067
reference_id RHSA-2022:9067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9067
18
reference_url https://access.redhat.com/errata/RHSA-2022:9068
reference_id RHSA-2022:9068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9068
19
reference_url https://access.redhat.com/errata/RHSA-2022:9069
reference_id RHSA-2022:9069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9069
20
reference_url https://access.redhat.com/errata/RHSA-2022:9070
reference_id RHSA-2022:9070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9070
21
reference_url https://access.redhat.com/errata/RHSA-2022:9071
reference_id RHSA-2022:9071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9071
22
reference_url https://access.redhat.com/errata/RHSA-2022:9072
reference_id RHSA-2022:9072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9072
23
reference_url https://access.redhat.com/errata/RHSA-2022:9074
reference_id RHSA-2022:9074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9074
24
reference_url https://access.redhat.com/errata/RHSA-2022:9075
reference_id RHSA-2022:9075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9075
25
reference_url https://access.redhat.com/errata/RHSA-2022:9076
reference_id RHSA-2022:9076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9076
26
reference_url https://access.redhat.com/errata/RHSA-2022:9077
reference_id RHSA-2022:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9077
27
reference_url https://access.redhat.com/errata/RHSA-2022:9078
reference_id RHSA-2022:9078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9078
28
reference_url https://access.redhat.com/errata/RHSA-2022:9079
reference_id RHSA-2022:9079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9079
29
reference_url https://access.redhat.com/errata/RHSA-2022:9080
reference_id RHSA-2022:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9080
30
reference_url https://access.redhat.com/errata/RHSA-2022:9081
reference_id RHSA-2022:9081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9081
31
reference_url https://usn.ubuntu.com/5782-1/
reference_id USN-5782-1
reference_type
scores
url https://usn.ubuntu.com/5782-1/
32
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:deb/debian/firefox@108.0-1?distro=sid
purl pkg:deb/debian/firefox@108.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@108.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
aliases CVE-2022-46874
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yxy6-s185-myc9
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@108.0-1%3Fdistro=sid