Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/mail-client/thunderbird-bin@68.6.0
Typeebuild
Namespacemail-client
Namethunderbird-bin
Version68.6.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version68.8.0
Latest_non_vulnerable_version128.9.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-16ta-j6p4-afgn
vulnerability_id VCID-16ta-j6p4-afgn
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6794.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6794.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6794
reference_id
reference_type
scores
0
value 0.00399
scoring_system epss
scoring_elements 0.60538
published_at 2026-04-01T12:55:00Z
1
value 0.00399
scoring_system epss
scoring_elements 0.60668
published_at 2026-04-13T12:55:00Z
2
value 0.00399
scoring_system epss
scoring_elements 0.60702
published_at 2026-04-11T12:55:00Z
3
value 0.00399
scoring_system epss
scoring_elements 0.60688
published_at 2026-04-12T12:55:00Z
4
value 0.00399
scoring_system epss
scoring_elements 0.60612
published_at 2026-04-02T12:55:00Z
5
value 0.00399
scoring_system epss
scoring_elements 0.60642
published_at 2026-04-04T12:55:00Z
6
value 0.00399
scoring_system epss
scoring_elements 0.60613
published_at 2026-04-07T12:55:00Z
7
value 0.00399
scoring_system epss
scoring_elements 0.60662
published_at 2026-04-08T12:55:00Z
8
value 0.00399
scoring_system epss
scoring_elements 0.60677
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801956
reference_id 1801956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801956
9
reference_url https://security.archlinux.org/ASA-202002-9
reference_id ASA-202002-9
reference_type
scores
url https://security.archlinux.org/ASA-202002-9
10
reference_url https://security.archlinux.org/AVG-1099
reference_id AVG-1099
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1099
11
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
reference_id mfsa2020-07
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
13
reference_url https://access.redhat.com/errata/RHSA-2020:0565
reference_id RHSA-2020:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0565
14
reference_url https://access.redhat.com/errata/RHSA-2020:0574
reference_id RHSA-2020:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0574
15
reference_url https://access.redhat.com/errata/RHSA-2020:0576
reference_id RHSA-2020:0576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0576
16
reference_url https://access.redhat.com/errata/RHSA-2020:0577
reference_id RHSA-2020:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0577
17
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
18
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2020-6794
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-16ta-j6p4-afgn
1
url VCID-1a64-m2w1-hkhs
vulnerability_id VCID-1a64-m2w1-hkhs
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6814.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6814.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6814
reference_id
reference_type
scores
0
value 0.00837
scoring_system epss
scoring_elements 0.74664
published_at 2026-04-13T12:55:00Z
1
value 0.00837
scoring_system epss
scoring_elements 0.74673
published_at 2026-04-12T12:55:00Z
2
value 0.00837
scoring_system epss
scoring_elements 0.74619
published_at 2026-04-01T12:55:00Z
3
value 0.00837
scoring_system epss
scoring_elements 0.74693
published_at 2026-04-11T12:55:00Z
4
value 0.00837
scoring_system epss
scoring_elements 0.7467
published_at 2026-04-09T12:55:00Z
5
value 0.00837
scoring_system epss
scoring_elements 0.74655
published_at 2026-04-08T12:55:00Z
6
value 0.00837
scoring_system epss
scoring_elements 0.74624
published_at 2026-04-07T12:55:00Z
7
value 0.00837
scoring_system epss
scoring_elements 0.74623
published_at 2026-04-02T12:55:00Z
8
value 0.00837
scoring_system epss
scoring_elements 0.7465
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6814
2
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1592078%2C1604847%2C1608256%2C1612636%2C1614339
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1592078%2C1604847%2C1608256%2C1612636%2C1614339
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://www.mozilla.org/security/advisories/mfsa2020-08/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-08/
12
reference_url https://www.mozilla.org/security/advisories/mfsa2020-09/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-09/
13
reference_url https://www.mozilla.org/security/advisories/mfsa2020-10/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-10/
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1812205
reference_id 1812205
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1812205
15
reference_url https://security.archlinux.org/ASA-202003-11
reference_id ASA-202003-11
reference_type
scores
url https://security.archlinux.org/ASA-202003-11
16
reference_url https://security.archlinux.org/ASA-202003-8
reference_id ASA-202003-8
reference_type
scores
url https://security.archlinux.org/ASA-202003-8
17
reference_url https://security.archlinux.org/AVG-1112
reference_id AVG-1112
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1112
18
reference_url https://security.archlinux.org/AVG-1115
reference_id AVG-1115
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1115
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-6814
reference_id CVE-2020-6814
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-6814
26
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
27
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
reference_id mfsa2020-08
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
reference_id mfsa2020-09
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
reference_id mfsa2020-10
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
31
reference_url https://access.redhat.com/errata/RHSA-2020:0815
reference_id RHSA-2020:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0815
32
reference_url https://access.redhat.com/errata/RHSA-2020:0816
reference_id RHSA-2020:0816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0816
33
reference_url https://access.redhat.com/errata/RHSA-2020:0819
reference_id RHSA-2020:0819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0819
34
reference_url https://access.redhat.com/errata/RHSA-2020:0820
reference_id RHSA-2020:0820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0820
35
reference_url https://access.redhat.com/errata/RHSA-2020:0905
reference_id RHSA-2020:0905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0905
36
reference_url https://access.redhat.com/errata/RHSA-2020:0914
reference_id RHSA-2020:0914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0914
37
reference_url https://access.redhat.com/errata/RHSA-2020:0918
reference_id RHSA-2020:0918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0918
38
reference_url https://access.redhat.com/errata/RHSA-2020:0919
reference_id RHSA-2020:0919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0919
39
reference_url https://usn.ubuntu.com/4299-1/
reference_id USN-4299-1
reference_type
scores
url https://usn.ubuntu.com/4299-1/
40
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
41
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2020-6814
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1a64-m2w1-hkhs
2
url VCID-23mb-npay-uqaq
vulnerability_id VCID-23mb-npay-uqaq
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6793.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6793.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6793
reference_id
reference_type
scores
0
value 0.00803
scoring_system epss
scoring_elements 0.7405
published_at 2026-04-01T12:55:00Z
1
value 0.00803
scoring_system epss
scoring_elements 0.74098
published_at 2026-04-13T12:55:00Z
2
value 0.00803
scoring_system epss
scoring_elements 0.74122
published_at 2026-04-11T12:55:00Z
3
value 0.00803
scoring_system epss
scoring_elements 0.74104
published_at 2026-04-12T12:55:00Z
4
value 0.00803
scoring_system epss
scoring_elements 0.74056
published_at 2026-04-02T12:55:00Z
5
value 0.00803
scoring_system epss
scoring_elements 0.74082
published_at 2026-04-04T12:55:00Z
6
value 0.00803
scoring_system epss
scoring_elements 0.74053
published_at 2026-04-07T12:55:00Z
7
value 0.00803
scoring_system epss
scoring_elements 0.74086
published_at 2026-04-08T12:55:00Z
8
value 0.00803
scoring_system epss
scoring_elements 0.74101
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6793
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801955
reference_id 1801955
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801955
9
reference_url https://security.archlinux.org/ASA-202002-9
reference_id ASA-202002-9
reference_type
scores
url https://security.archlinux.org/ASA-202002-9
10
reference_url https://security.archlinux.org/AVG-1099
reference_id AVG-1099
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1099
11
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
reference_id mfsa2020-07
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
13
reference_url https://access.redhat.com/errata/RHSA-2020:0565
reference_id RHSA-2020:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0565
14
reference_url https://access.redhat.com/errata/RHSA-2020:0574
reference_id RHSA-2020:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0574
15
reference_url https://access.redhat.com/errata/RHSA-2020:0576
reference_id RHSA-2020:0576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0576
16
reference_url https://access.redhat.com/errata/RHSA-2020:0577
reference_id RHSA-2020:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0577
17
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
18
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2020-6793
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-23mb-npay-uqaq
3
url VCID-3smq-ax5u-ryd3
vulnerability_id VCID-3smq-ax5u-ryd3
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17012.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17012.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17012
reference_id
reference_type
scores
0
value 0.02152
scoring_system epss
scoring_elements 0.84253
published_at 2026-04-13T12:55:00Z
1
value 0.02152
scoring_system epss
scoring_elements 0.84214
published_at 2026-04-04T12:55:00Z
2
value 0.02152
scoring_system epss
scoring_elements 0.84215
published_at 2026-04-07T12:55:00Z
3
value 0.02152
scoring_system epss
scoring_elements 0.84237
published_at 2026-04-08T12:55:00Z
4
value 0.02152
scoring_system epss
scoring_elements 0.84243
published_at 2026-04-09T12:55:00Z
5
value 0.02152
scoring_system epss
scoring_elements 0.84261
published_at 2026-04-11T12:55:00Z
6
value 0.02152
scoring_system epss
scoring_elements 0.84256
published_at 2026-04-12T12:55:00Z
7
value 0.02152
scoring_system epss
scoring_elements 0.84183
published_at 2026-04-01T12:55:00Z
8
value 0.02152
scoring_system epss
scoring_elements 0.84196
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17012
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1779437
reference_id 1779437
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1779437
9
reference_url https://security.archlinux.org/ASA-201912-1
reference_id ASA-201912-1
reference_type
scores
url https://security.archlinux.org/ASA-201912-1
10
reference_url https://security.archlinux.org/ASA-201912-2
reference_id ASA-201912-2
reference_type
scores
url https://security.archlinux.org/ASA-201912-2
11
reference_url https://security.archlinux.org/AVG-1071
reference_id AVG-1071
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1071
12
reference_url https://security.archlinux.org/AVG-1072
reference_id AVG-1072
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1072
13
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
14
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
reference_id mfsa2019-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
reference_id mfsa2019-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
reference_id mfsa2019-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
18
reference_url https://access.redhat.com/errata/RHSA-2019:4107
reference_id RHSA-2019:4107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4107
19
reference_url https://access.redhat.com/errata/RHSA-2019:4108
reference_id RHSA-2019:4108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4108
20
reference_url https://access.redhat.com/errata/RHSA-2019:4111
reference_id RHSA-2019:4111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4111
21
reference_url https://access.redhat.com/errata/RHSA-2019:4148
reference_id RHSA-2019:4148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4148
22
reference_url https://access.redhat.com/errata/RHSA-2019:4195
reference_id RHSA-2019:4195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4195
23
reference_url https://access.redhat.com/errata/RHSA-2019:4205
reference_id RHSA-2019:4205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4205
24
reference_url https://access.redhat.com/errata/RHSA-2020:0292
reference_id RHSA-2020:0292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0292
25
reference_url https://access.redhat.com/errata/RHSA-2020:0295
reference_id RHSA-2020:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0295
26
reference_url https://usn.ubuntu.com/4216-1/
reference_id USN-4216-1
reference_type
scores
url https://usn.ubuntu.com/4216-1/
27
reference_url https://usn.ubuntu.com/4216-2/
reference_id USN-4216-2
reference_type
scores
url https://usn.ubuntu.com/4216-2/
28
reference_url https://usn.ubuntu.com/4241-1/
reference_id USN-4241-1
reference_type
scores
url https://usn.ubuntu.com/4241-1/
29
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2019-17012
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3smq-ax5u-ryd3
4
url VCID-9c8c-d9u8-83bx
vulnerability_id VCID-9c8c-d9u8-83bx
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6795.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6795.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6795
reference_id
reference_type
scores
0
value 0.00688
scoring_system epss
scoring_elements 0.7168
published_at 2026-04-01T12:55:00Z
1
value 0.00688
scoring_system epss
scoring_elements 0.71718
published_at 2026-04-13T12:55:00Z
2
value 0.00688
scoring_system epss
scoring_elements 0.71752
published_at 2026-04-11T12:55:00Z
3
value 0.00688
scoring_system epss
scoring_elements 0.71735
published_at 2026-04-12T12:55:00Z
4
value 0.00688
scoring_system epss
scoring_elements 0.71686
published_at 2026-04-02T12:55:00Z
5
value 0.00688
scoring_system epss
scoring_elements 0.71704
published_at 2026-04-04T12:55:00Z
6
value 0.00688
scoring_system epss
scoring_elements 0.71678
published_at 2026-04-07T12:55:00Z
7
value 0.00688
scoring_system epss
scoring_elements 0.71717
published_at 2026-04-08T12:55:00Z
8
value 0.00688
scoring_system epss
scoring_elements 0.71728
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6795
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801957
reference_id 1801957
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801957
9
reference_url https://security.archlinux.org/ASA-202002-9
reference_id ASA-202002-9
reference_type
scores
url https://security.archlinux.org/ASA-202002-9
10
reference_url https://security.archlinux.org/AVG-1099
reference_id AVG-1099
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1099
11
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
reference_id mfsa2020-07
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
13
reference_url https://access.redhat.com/errata/RHSA-2020:0565
reference_id RHSA-2020:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0565
14
reference_url https://access.redhat.com/errata/RHSA-2020:0574
reference_id RHSA-2020:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0574
15
reference_url https://access.redhat.com/errata/RHSA-2020:0576
reference_id RHSA-2020:0576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0576
16
reference_url https://access.redhat.com/errata/RHSA-2020:0577
reference_id RHSA-2020:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0577
17
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
18
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2020-6795
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9c8c-d9u8-83bx
5
url VCID-b67z-91x3-sug1
vulnerability_id VCID-b67z-91x3-sug1
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11764.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11764.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11764
reference_id
reference_type
scores
0
value 0.00976
scoring_system epss
scoring_elements 0.76702
published_at 2026-04-13T12:55:00Z
1
value 0.00976
scoring_system epss
scoring_elements 0.76658
published_at 2026-04-07T12:55:00Z
2
value 0.00976
scoring_system epss
scoring_elements 0.7669
published_at 2026-04-08T12:55:00Z
3
value 0.00976
scoring_system epss
scoring_elements 0.76701
published_at 2026-04-09T12:55:00Z
4
value 0.00976
scoring_system epss
scoring_elements 0.7673
published_at 2026-04-11T12:55:00Z
5
value 0.00976
scoring_system epss
scoring_elements 0.7671
published_at 2026-04-12T12:55:00Z
6
value 0.00976
scoring_system epss
scoring_elements 0.76644
published_at 2026-04-01T12:55:00Z
7
value 0.00976
scoring_system epss
scoring_elements 0.76648
published_at 2026-04-02T12:55:00Z
8
value 0.00976
scoring_system epss
scoring_elements 0.76677
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11764
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1764446
reference_id 1764446
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1764446
12
reference_url https://security.archlinux.org/ASA-201910-15
reference_id ASA-201910-15
reference_type
scores
url https://security.archlinux.org/ASA-201910-15
13
reference_url https://security.archlinux.org/ASA-201910-16
reference_id ASA-201910-16
reference_type
scores
url https://security.archlinux.org/ASA-201910-16
14
reference_url https://security.archlinux.org/AVG-1054
reference_id AVG-1054
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1054
15
reference_url https://security.archlinux.org/AVG-1055
reference_id AVG-1055
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1055
16
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
reference_id mfsa2019-33
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
reference_id mfsa2019-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
reference_id mfsa2019-35
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
20
reference_url https://access.redhat.com/errata/RHSA-2019:3193
reference_id RHSA-2019:3193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3193
21
reference_url https://access.redhat.com/errata/RHSA-2019:3196
reference_id RHSA-2019:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3196
22
reference_url https://access.redhat.com/errata/RHSA-2019:3210
reference_id RHSA-2019:3210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3210
23
reference_url https://access.redhat.com/errata/RHSA-2019:3237
reference_id RHSA-2019:3237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3237
24
reference_url https://access.redhat.com/errata/RHSA-2019:3281
reference_id RHSA-2019:3281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3281
25
reference_url https://access.redhat.com/errata/RHSA-2019:3756
reference_id RHSA-2019:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3756
26
reference_url https://usn.ubuntu.com/4165-1/
reference_id USN-4165-1
reference_type
scores
url https://usn.ubuntu.com/4165-1/
27
reference_url https://usn.ubuntu.com/4202-1/
reference_id USN-4202-1
reference_type
scores
url https://usn.ubuntu.com/4202-1/
28
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2019-11764
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b67z-91x3-sug1
6
url VCID-bae9-9f51-wqac
vulnerability_id VCID-bae9-9f51-wqac
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11760.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11760.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11760
reference_id
reference_type
scores
0
value 0.01522
scoring_system epss
scoring_elements 0.81256
published_at 2026-04-13T12:55:00Z
1
value 0.01522
scoring_system epss
scoring_elements 0.81224
published_at 2026-04-07T12:55:00Z
2
value 0.01522
scoring_system epss
scoring_elements 0.81252
published_at 2026-04-08T12:55:00Z
3
value 0.01522
scoring_system epss
scoring_elements 0.81257
published_at 2026-04-09T12:55:00Z
4
value 0.01522
scoring_system epss
scoring_elements 0.81277
published_at 2026-04-11T12:55:00Z
5
value 0.01522
scoring_system epss
scoring_elements 0.81263
published_at 2026-04-12T12:55:00Z
6
value 0.01522
scoring_system epss
scoring_elements 0.81192
published_at 2026-04-01T12:55:00Z
7
value 0.01522
scoring_system epss
scoring_elements 0.81201
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11760
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1764441
reference_id 1764441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1764441
12
reference_url https://security.archlinux.org/ASA-201910-15
reference_id ASA-201910-15
reference_type
scores
url https://security.archlinux.org/ASA-201910-15
13
reference_url https://security.archlinux.org/ASA-201910-16
reference_id ASA-201910-16
reference_type
scores
url https://security.archlinux.org/ASA-201910-16
14
reference_url https://security.archlinux.org/AVG-1054
reference_id AVG-1054
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1054
15
reference_url https://security.archlinux.org/AVG-1055
reference_id AVG-1055
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1055
16
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
reference_id mfsa2019-33
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
reference_id mfsa2019-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
reference_id mfsa2019-35
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
20
reference_url https://access.redhat.com/errata/RHSA-2019:3193
reference_id RHSA-2019:3193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3193
21
reference_url https://access.redhat.com/errata/RHSA-2019:3196
reference_id RHSA-2019:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3196
22
reference_url https://access.redhat.com/errata/RHSA-2019:3210
reference_id RHSA-2019:3210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3210
23
reference_url https://access.redhat.com/errata/RHSA-2019:3237
reference_id RHSA-2019:3237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3237
24
reference_url https://access.redhat.com/errata/RHSA-2019:3281
reference_id RHSA-2019:3281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3281
25
reference_url https://access.redhat.com/errata/RHSA-2019:3756
reference_id RHSA-2019:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3756
26
reference_url https://usn.ubuntu.com/4165-1/
reference_id USN-4165-1
reference_type
scores
url https://usn.ubuntu.com/4165-1/
27
reference_url https://usn.ubuntu.com/4202-1/
reference_id USN-4202-1
reference_type
scores
url https://usn.ubuntu.com/4202-1/
28
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2019-11760
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bae9-9f51-wqac
7
url VCID-cy4f-4pvz-23fh
vulnerability_id VCID-cy4f-4pvz-23fh
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6792.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6792.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6792
reference_id
reference_type
scores
0
value 0.00953
scoring_system epss
scoring_elements 0.76346
published_at 2026-04-01T12:55:00Z
1
value 0.00953
scoring_system epss
scoring_elements 0.76404
published_at 2026-04-13T12:55:00Z
2
value 0.00953
scoring_system epss
scoring_elements 0.76431
published_at 2026-04-11T12:55:00Z
3
value 0.00953
scoring_system epss
scoring_elements 0.76409
published_at 2026-04-12T12:55:00Z
4
value 0.00953
scoring_system epss
scoring_elements 0.7635
published_at 2026-04-02T12:55:00Z
5
value 0.00953
scoring_system epss
scoring_elements 0.76379
published_at 2026-04-04T12:55:00Z
6
value 0.00953
scoring_system epss
scoring_elements 0.76359
published_at 2026-04-07T12:55:00Z
7
value 0.00953
scoring_system epss
scoring_elements 0.76392
published_at 2026-04-08T12:55:00Z
8
value 0.00953
scoring_system epss
scoring_elements 0.76405
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6792
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801958
reference_id 1801958
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801958
9
reference_url https://security.archlinux.org/ASA-202002-9
reference_id ASA-202002-9
reference_type
scores
url https://security.archlinux.org/ASA-202002-9
10
reference_url https://security.archlinux.org/AVG-1099
reference_id AVG-1099
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1099
11
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
reference_id mfsa2020-07
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
13
reference_url https://access.redhat.com/errata/RHSA-2020:0565
reference_id RHSA-2020:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0565
14
reference_url https://access.redhat.com/errata/RHSA-2020:0574
reference_id RHSA-2020:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0574
15
reference_url https://access.redhat.com/errata/RHSA-2020:0576
reference_id RHSA-2020:0576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0576
16
reference_url https://access.redhat.com/errata/RHSA-2020:0577
reference_id RHSA-2020:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0577
17
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
18
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2020-6792
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cy4f-4pvz-23fh
8
url VCID-ex1b-2rdy-7qhw
vulnerability_id VCID-ex1b-2rdy-7qhw
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17005.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17005.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17005
reference_id
reference_type
scores
0
value 0.02867
scoring_system epss
scoring_elements 0.8626
published_at 2026-04-13T12:55:00Z
1
value 0.02867
scoring_system epss
scoring_elements 0.86222
published_at 2026-04-04T12:55:00Z
2
value 0.02867
scoring_system epss
scoring_elements 0.86223
published_at 2026-04-07T12:55:00Z
3
value 0.02867
scoring_system epss
scoring_elements 0.86241
published_at 2026-04-08T12:55:00Z
4
value 0.02867
scoring_system epss
scoring_elements 0.86253
published_at 2026-04-09T12:55:00Z
5
value 0.02867
scoring_system epss
scoring_elements 0.86267
published_at 2026-04-11T12:55:00Z
6
value 0.02867
scoring_system epss
scoring_elements 0.86264
published_at 2026-04-12T12:55:00Z
7
value 0.02867
scoring_system epss
scoring_elements 0.86199
published_at 2026-04-01T12:55:00Z
8
value 0.02867
scoring_system epss
scoring_elements 0.86209
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17005
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1779435
reference_id 1779435
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1779435
9
reference_url https://security.archlinux.org/ASA-201912-1
reference_id ASA-201912-1
reference_type
scores
url https://security.archlinux.org/ASA-201912-1
10
reference_url https://security.archlinux.org/ASA-201912-2
reference_id ASA-201912-2
reference_type
scores
url https://security.archlinux.org/ASA-201912-2
11
reference_url https://security.archlinux.org/AVG-1071
reference_id AVG-1071
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1071
12
reference_url https://security.archlinux.org/AVG-1072
reference_id AVG-1072
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1072
13
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
14
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
reference_id mfsa2019-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
reference_id mfsa2019-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
reference_id mfsa2019-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
18
reference_url https://access.redhat.com/errata/RHSA-2019:4107
reference_id RHSA-2019:4107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4107
19
reference_url https://access.redhat.com/errata/RHSA-2019:4108
reference_id RHSA-2019:4108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4108
20
reference_url https://access.redhat.com/errata/RHSA-2019:4111
reference_id RHSA-2019:4111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4111
21
reference_url https://access.redhat.com/errata/RHSA-2019:4148
reference_id RHSA-2019:4148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4148
22
reference_url https://access.redhat.com/errata/RHSA-2019:4195
reference_id RHSA-2019:4195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4195
23
reference_url https://access.redhat.com/errata/RHSA-2019:4205
reference_id RHSA-2019:4205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4205
24
reference_url https://access.redhat.com/errata/RHSA-2020:0292
reference_id RHSA-2020:0292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0292
25
reference_url https://access.redhat.com/errata/RHSA-2020:0295
reference_id RHSA-2020:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0295
26
reference_url https://usn.ubuntu.com/4216-1/
reference_id USN-4216-1
reference_type
scores
url https://usn.ubuntu.com/4216-1/
27
reference_url https://usn.ubuntu.com/4216-2/
reference_id USN-4216-2
reference_type
scores
url https://usn.ubuntu.com/4216-2/
28
reference_url https://usn.ubuntu.com/4241-1/
reference_id USN-4241-1
reference_type
scores
url https://usn.ubuntu.com/4241-1/
29
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2019-17005
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ex1b-2rdy-7qhw
9
url VCID-j64y-ejt3-tbe3
vulnerability_id VCID-j64y-ejt3-tbe3
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11757.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11757.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11757
reference_id
reference_type
scores
0
value 0.0139
scoring_system epss
scoring_elements 0.80351
published_at 2026-04-13T12:55:00Z
1
value 0.0139
scoring_system epss
scoring_elements 0.80314
published_at 2026-04-07T12:55:00Z
2
value 0.0139
scoring_system epss
scoring_elements 0.80343
published_at 2026-04-08T12:55:00Z
3
value 0.0139
scoring_system epss
scoring_elements 0.80354
published_at 2026-04-09T12:55:00Z
4
value 0.0139
scoring_system epss
scoring_elements 0.80372
published_at 2026-04-11T12:55:00Z
5
value 0.0139
scoring_system epss
scoring_elements 0.80357
published_at 2026-04-12T12:55:00Z
6
value 0.0139
scoring_system epss
scoring_elements 0.80298
published_at 2026-04-01T12:55:00Z
7
value 0.0139
scoring_system epss
scoring_elements 0.80306
published_at 2026-04-02T12:55:00Z
8
value 0.0139
scoring_system epss
scoring_elements 0.80326
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11757
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1764438
reference_id 1764438
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1764438
12
reference_url https://security.archlinux.org/ASA-201910-15
reference_id ASA-201910-15
reference_type
scores
url https://security.archlinux.org/ASA-201910-15
13
reference_url https://security.archlinux.org/ASA-201910-16
reference_id ASA-201910-16
reference_type
scores
url https://security.archlinux.org/ASA-201910-16
14
reference_url https://security.archlinux.org/AVG-1054
reference_id AVG-1054
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1054
15
reference_url https://security.archlinux.org/AVG-1055
reference_id AVG-1055
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1055
16
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
reference_id mfsa2019-33
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
reference_id mfsa2019-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
reference_id mfsa2019-35
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
20
reference_url https://access.redhat.com/errata/RHSA-2019:3193
reference_id RHSA-2019:3193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3193
21
reference_url https://access.redhat.com/errata/RHSA-2019:3196
reference_id RHSA-2019:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3196
22
reference_url https://access.redhat.com/errata/RHSA-2019:3210
reference_id RHSA-2019:3210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3210
23
reference_url https://access.redhat.com/errata/RHSA-2019:3237
reference_id RHSA-2019:3237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3237
24
reference_url https://access.redhat.com/errata/RHSA-2019:3281
reference_id RHSA-2019:3281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3281
25
reference_url https://access.redhat.com/errata/RHSA-2019:3756
reference_id RHSA-2019:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3756
26
reference_url https://usn.ubuntu.com/4165-1/
reference_id USN-4165-1
reference_type
scores
url https://usn.ubuntu.com/4165-1/
27
reference_url https://usn.ubuntu.com/4202-1/
reference_id USN-4202-1
reference_type
scores
url https://usn.ubuntu.com/4202-1/
28
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2019-11757
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j64y-ejt3-tbe3
10
url VCID-jr81-ed7a-aqcp
vulnerability_id VCID-jr81-ed7a-aqcp
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6811.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6811.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6811
reference_id
reference_type
scores
0
value 0.01843
scoring_system epss
scoring_elements 0.82963
published_at 2026-04-13T12:55:00Z
1
value 0.01843
scoring_system epss
scoring_elements 0.82967
published_at 2026-04-12T12:55:00Z
2
value 0.01843
scoring_system epss
scoring_elements 0.82899
published_at 2026-04-01T12:55:00Z
3
value 0.01843
scoring_system epss
scoring_elements 0.82972
published_at 2026-04-11T12:55:00Z
4
value 0.01843
scoring_system epss
scoring_elements 0.82957
published_at 2026-04-09T12:55:00Z
5
value 0.01843
scoring_system epss
scoring_elements 0.8295
published_at 2026-04-08T12:55:00Z
6
value 0.01843
scoring_system epss
scoring_elements 0.82925
published_at 2026-04-07T12:55:00Z
7
value 0.01843
scoring_system epss
scoring_elements 0.82916
published_at 2026-04-02T12:55:00Z
8
value 0.01843
scoring_system epss
scoring_elements 0.82929
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6811
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1607742
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1607742
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://www.mozilla.org/security/advisories/mfsa2020-08/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-08/
12
reference_url https://www.mozilla.org/security/advisories/mfsa2020-09/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-09/
13
reference_url https://www.mozilla.org/security/advisories/mfsa2020-10/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-10/
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1812202
reference_id 1812202
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1812202
15
reference_url https://security.archlinux.org/ASA-202003-11
reference_id ASA-202003-11
reference_type
scores
url https://security.archlinux.org/ASA-202003-11
16
reference_url https://security.archlinux.org/ASA-202003-8
reference_id ASA-202003-8
reference_type
scores
url https://security.archlinux.org/ASA-202003-8
17
reference_url https://security.archlinux.org/AVG-1112
reference_id AVG-1112
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1112
18
reference_url https://security.archlinux.org/AVG-1115
reference_id AVG-1115
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1115
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-6811
reference_id CVE-2020-6811
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-6811
26
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
27
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
reference_id mfsa2020-08
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
reference_id mfsa2020-09
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
reference_id mfsa2020-10
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
31
reference_url https://access.redhat.com/errata/RHSA-2020:0815
reference_id RHSA-2020:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0815
32
reference_url https://access.redhat.com/errata/RHSA-2020:0816
reference_id RHSA-2020:0816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0816
33
reference_url https://access.redhat.com/errata/RHSA-2020:0819
reference_id RHSA-2020:0819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0819
34
reference_url https://access.redhat.com/errata/RHSA-2020:0820
reference_id RHSA-2020:0820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0820
35
reference_url https://access.redhat.com/errata/RHSA-2020:0905
reference_id RHSA-2020:0905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0905
36
reference_url https://access.redhat.com/errata/RHSA-2020:0914
reference_id RHSA-2020:0914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0914
37
reference_url https://access.redhat.com/errata/RHSA-2020:0918
reference_id RHSA-2020:0918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0918
38
reference_url https://access.redhat.com/errata/RHSA-2020:0919
reference_id RHSA-2020:0919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0919
39
reference_url https://usn.ubuntu.com/4299-1/
reference_id USN-4299-1
reference_type
scores
url https://usn.ubuntu.com/4299-1/
40
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
41
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2020-6811
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jr81-ed7a-aqcp
11
url VCID-m5h6-y3tw-eue6
vulnerability_id VCID-m5h6-y3tw-eue6
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20503.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20503.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-20503
reference_id
reference_type
scores
0
value 0.02474
scoring_system epss
scoring_elements 0.85277
published_at 2026-04-13T12:55:00Z
1
value 0.02474
scoring_system epss
scoring_elements 0.8528
published_at 2026-04-12T12:55:00Z
2
value 0.02474
scoring_system epss
scoring_elements 0.85205
published_at 2026-04-01T12:55:00Z
3
value 0.02474
scoring_system epss
scoring_elements 0.85282
published_at 2026-04-11T12:55:00Z
4
value 0.02474
scoring_system epss
scoring_elements 0.85267
published_at 2026-04-09T12:55:00Z
5
value 0.02474
scoring_system epss
scoring_elements 0.85259
published_at 2026-04-08T12:55:00Z
6
value 0.02474
scoring_system epss
scoring_elements 0.85237
published_at 2026-04-07T12:55:00Z
7
value 0.02474
scoring_system epss
scoring_elements 0.85235
published_at 2026-04-04T12:55:00Z
8
value 0.02474
scoring_system epss
scoring_elements 0.85216
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-20503
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6422
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6422
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6424
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6424
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6425
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6425
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6426
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6427
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6428
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6429
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6449
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1812203
reference_id 1812203
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1812203
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953270
reference_id 953270
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953270
20
reference_url https://security.archlinux.org/ASA-202003-11
reference_id ASA-202003-11
reference_type
scores
url https://security.archlinux.org/ASA-202003-11
21
reference_url https://security.archlinux.org/ASA-202003-12
reference_id ASA-202003-12
reference_type
scores
url https://security.archlinux.org/ASA-202003-12
22
reference_url https://security.archlinux.org/ASA-202003-8
reference_id ASA-202003-8
reference_type
scores
url https://security.archlinux.org/ASA-202003-8
23
reference_url https://security.archlinux.org/AVG-1112
reference_id AVG-1112
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1112
24
reference_url https://security.archlinux.org/AVG-1115
reference_id AVG-1115
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1115
25
reference_url https://security.archlinux.org/AVG-1118
reference_id AVG-1118
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1118
26
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
27
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
reference_id mfsa2020-08
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
reference_id mfsa2020-09
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
reference_id mfsa2020-10
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
31
reference_url https://access.redhat.com/errata/RHSA-2020:0815
reference_id RHSA-2020:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0815
32
reference_url https://access.redhat.com/errata/RHSA-2020:0816
reference_id RHSA-2020:0816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0816
33
reference_url https://access.redhat.com/errata/RHSA-2020:0819
reference_id RHSA-2020:0819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0819
34
reference_url https://access.redhat.com/errata/RHSA-2020:0820
reference_id RHSA-2020:0820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0820
35
reference_url https://access.redhat.com/errata/RHSA-2020:0905
reference_id RHSA-2020:0905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0905
36
reference_url https://access.redhat.com/errata/RHSA-2020:0914
reference_id RHSA-2020:0914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0914
37
reference_url https://access.redhat.com/errata/RHSA-2020:0918
reference_id RHSA-2020:0918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0918
38
reference_url https://access.redhat.com/errata/RHSA-2020:0919
reference_id RHSA-2020:0919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0919
39
reference_url https://access.redhat.com/errata/RHSA-2020:1270
reference_id RHSA-2020:1270
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1270
40
reference_url https://usn.ubuntu.com/4299-1/
reference_id USN-4299-1
reference_type
scores
url https://usn.ubuntu.com/4299-1/
41
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
42
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2019-20503
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m5h6-y3tw-eue6
12
url VCID-mnt3-q341-j7gj
vulnerability_id VCID-mnt3-q341-j7gj
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11763.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11763.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11763
reference_id
reference_type
scores
0
value 0.0223
scoring_system epss
scoring_elements 0.8453
published_at 2026-04-13T12:55:00Z
1
value 0.0223
scoring_system epss
scoring_elements 0.84493
published_at 2026-04-07T12:55:00Z
2
value 0.0223
scoring_system epss
scoring_elements 0.84514
published_at 2026-04-08T12:55:00Z
3
value 0.0223
scoring_system epss
scoring_elements 0.8452
published_at 2026-04-09T12:55:00Z
4
value 0.0223
scoring_system epss
scoring_elements 0.84539
published_at 2026-04-11T12:55:00Z
5
value 0.0223
scoring_system epss
scoring_elements 0.84534
published_at 2026-04-12T12:55:00Z
6
value 0.0223
scoring_system epss
scoring_elements 0.84456
published_at 2026-04-01T12:55:00Z
7
value 0.0223
scoring_system epss
scoring_elements 0.84472
published_at 2026-04-02T12:55:00Z
8
value 0.0223
scoring_system epss
scoring_elements 0.84491
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11763
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1764444
reference_id 1764444
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1764444
12
reference_url https://security.archlinux.org/ASA-201910-15
reference_id ASA-201910-15
reference_type
scores
url https://security.archlinux.org/ASA-201910-15
13
reference_url https://security.archlinux.org/ASA-201910-16
reference_id ASA-201910-16
reference_type
scores
url https://security.archlinux.org/ASA-201910-16
14
reference_url https://security.archlinux.org/AVG-1054
reference_id AVG-1054
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1054
15
reference_url https://security.archlinux.org/AVG-1055
reference_id AVG-1055
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1055
16
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
reference_id mfsa2019-33
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
reference_id mfsa2019-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
reference_id mfsa2019-35
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
20
reference_url https://access.redhat.com/errata/RHSA-2019:3193
reference_id RHSA-2019:3193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3193
21
reference_url https://access.redhat.com/errata/RHSA-2019:3196
reference_id RHSA-2019:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3196
22
reference_url https://access.redhat.com/errata/RHSA-2019:3210
reference_id RHSA-2019:3210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3210
23
reference_url https://access.redhat.com/errata/RHSA-2019:3237
reference_id RHSA-2019:3237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3237
24
reference_url https://access.redhat.com/errata/RHSA-2019:3281
reference_id RHSA-2019:3281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3281
25
reference_url https://access.redhat.com/errata/RHSA-2019:3756
reference_id RHSA-2019:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3756
26
reference_url https://usn.ubuntu.com/4165-1/
reference_id USN-4165-1
reference_type
scores
url https://usn.ubuntu.com/4165-1/
27
reference_url https://usn.ubuntu.com/4202-1/
reference_id USN-4202-1
reference_type
scores
url https://usn.ubuntu.com/4202-1/
28
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2019-11763
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mnt3-q341-j7gj
13
url VCID-nbvc-j1zu-v7d8
vulnerability_id VCID-nbvc-j1zu-v7d8
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11762.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11762.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11762
reference_id
reference_type
scores
0
value 0.00379
scoring_system epss
scoring_elements 0.59397
published_at 2026-04-13T12:55:00Z
1
value 0.00379
scoring_system epss
scoring_elements 0.59348
published_at 2026-04-07T12:55:00Z
2
value 0.00379
scoring_system epss
scoring_elements 0.59399
published_at 2026-04-08T12:55:00Z
3
value 0.00379
scoring_system epss
scoring_elements 0.59413
published_at 2026-04-09T12:55:00Z
4
value 0.00379
scoring_system epss
scoring_elements 0.59432
published_at 2026-04-11T12:55:00Z
5
value 0.00379
scoring_system epss
scoring_elements 0.59415
published_at 2026-04-12T12:55:00Z
6
value 0.00379
scoring_system epss
scoring_elements 0.59284
published_at 2026-04-01T12:55:00Z
7
value 0.00379
scoring_system epss
scoring_elements 0.59358
published_at 2026-04-02T12:55:00Z
8
value 0.00379
scoring_system epss
scoring_elements 0.59382
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11762
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1764443
reference_id 1764443
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1764443
12
reference_url https://security.archlinux.org/ASA-201910-15
reference_id ASA-201910-15
reference_type
scores
url https://security.archlinux.org/ASA-201910-15
13
reference_url https://security.archlinux.org/ASA-201910-16
reference_id ASA-201910-16
reference_type
scores
url https://security.archlinux.org/ASA-201910-16
14
reference_url https://security.archlinux.org/AVG-1054
reference_id AVG-1054
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1054
15
reference_url https://security.archlinux.org/AVG-1055
reference_id AVG-1055
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1055
16
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
reference_id mfsa2019-33
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
reference_id mfsa2019-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
reference_id mfsa2019-35
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
20
reference_url https://access.redhat.com/errata/RHSA-2019:3193
reference_id RHSA-2019:3193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3193
21
reference_url https://access.redhat.com/errata/RHSA-2019:3196
reference_id RHSA-2019:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3196
22
reference_url https://access.redhat.com/errata/RHSA-2019:3210
reference_id RHSA-2019:3210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3210
23
reference_url https://access.redhat.com/errata/RHSA-2019:3237
reference_id RHSA-2019:3237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3237
24
reference_url https://access.redhat.com/errata/RHSA-2019:3281
reference_id RHSA-2019:3281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3281
25
reference_url https://access.redhat.com/errata/RHSA-2019:3756
reference_id RHSA-2019:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3756
26
reference_url https://usn.ubuntu.com/4165-1/
reference_id USN-4165-1
reference_type
scores
url https://usn.ubuntu.com/4165-1/
27
reference_url https://usn.ubuntu.com/4202-1/
reference_id USN-4202-1
reference_type
scores
url https://usn.ubuntu.com/4202-1/
28
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2019-11762
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nbvc-j1zu-v7d8
14
url VCID-pws7-8qmm-hfes
vulnerability_id VCID-pws7-8qmm-hfes
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17008.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17008.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17008
reference_id
reference_type
scores
0
value 0.00854
scoring_system epss
scoring_elements 0.74936
published_at 2026-04-13T12:55:00Z
1
value 0.00854
scoring_system epss
scoring_elements 0.74925
published_at 2026-04-04T12:55:00Z
2
value 0.00854
scoring_system epss
scoring_elements 0.74899
published_at 2026-04-07T12:55:00Z
3
value 0.00854
scoring_system epss
scoring_elements 0.74933
published_at 2026-04-08T12:55:00Z
4
value 0.00854
scoring_system epss
scoring_elements 0.74945
published_at 2026-04-09T12:55:00Z
5
value 0.00854
scoring_system epss
scoring_elements 0.74968
published_at 2026-04-11T12:55:00Z
6
value 0.00854
scoring_system epss
scoring_elements 0.74946
published_at 2026-04-12T12:55:00Z
7
value 0.00854
scoring_system epss
scoring_elements 0.74896
published_at 2026-04-01T12:55:00Z
8
value 0.00854
scoring_system epss
scoring_elements 0.74897
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17008
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1779431
reference_id 1779431
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1779431
9
reference_url https://security.archlinux.org/ASA-201912-1
reference_id ASA-201912-1
reference_type
scores
url https://security.archlinux.org/ASA-201912-1
10
reference_url https://security.archlinux.org/ASA-201912-2
reference_id ASA-201912-2
reference_type
scores
url https://security.archlinux.org/ASA-201912-2
11
reference_url https://security.archlinux.org/AVG-1071
reference_id AVG-1071
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1071
12
reference_url https://security.archlinux.org/AVG-1072
reference_id AVG-1072
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1072
13
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
14
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
reference_id mfsa2019-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
reference_id mfsa2019-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
reference_id mfsa2019-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
18
reference_url https://access.redhat.com/errata/RHSA-2019:4107
reference_id RHSA-2019:4107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4107
19
reference_url https://access.redhat.com/errata/RHSA-2019:4108
reference_id RHSA-2019:4108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4108
20
reference_url https://access.redhat.com/errata/RHSA-2019:4111
reference_id RHSA-2019:4111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4111
21
reference_url https://access.redhat.com/errata/RHSA-2019:4148
reference_id RHSA-2019:4148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4148
22
reference_url https://access.redhat.com/errata/RHSA-2019:4195
reference_id RHSA-2019:4195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4195
23
reference_url https://access.redhat.com/errata/RHSA-2019:4205
reference_id RHSA-2019:4205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4205
24
reference_url https://access.redhat.com/errata/RHSA-2020:0292
reference_id RHSA-2020:0292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0292
25
reference_url https://access.redhat.com/errata/RHSA-2020:0295
reference_id RHSA-2020:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0295
26
reference_url https://usn.ubuntu.com/4216-1/
reference_id USN-4216-1
reference_type
scores
url https://usn.ubuntu.com/4216-1/
27
reference_url https://usn.ubuntu.com/4216-2/
reference_id USN-4216-2
reference_type
scores
url https://usn.ubuntu.com/4216-2/
28
reference_url https://usn.ubuntu.com/4241-1/
reference_id USN-4241-1
reference_type
scores
url https://usn.ubuntu.com/4241-1/
29
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2019-17008
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pws7-8qmm-hfes
15
url VCID-rszh-1c16-47ah
vulnerability_id VCID-rszh-1c16-47ah
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6798.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6798.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6798
reference_id
reference_type
scores
0
value 0.01646
scoring_system epss
scoring_elements 0.81972
published_at 2026-04-13T12:55:00Z
1
value 0.01646
scoring_system epss
scoring_elements 0.81939
published_at 2026-04-04T12:55:00Z
2
value 0.01646
scoring_system epss
scoring_elements 0.81935
published_at 2026-04-07T12:55:00Z
3
value 0.01646
scoring_system epss
scoring_elements 0.81962
published_at 2026-04-08T12:55:00Z
4
value 0.01646
scoring_system epss
scoring_elements 0.8197
published_at 2026-04-09T12:55:00Z
5
value 0.01646
scoring_system epss
scoring_elements 0.81989
published_at 2026-04-11T12:55:00Z
6
value 0.01646
scoring_system epss
scoring_elements 0.81978
published_at 2026-04-12T12:55:00Z
7
value 0.01646
scoring_system epss
scoring_elements 0.81905
published_at 2026-04-01T12:55:00Z
8
value 0.01646
scoring_system epss
scoring_elements 0.81916
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6798
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801918
reference_id 1801918
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801918
11
reference_url https://security.archlinux.org/ASA-202002-5
reference_id ASA-202002-5
reference_type
scores
url https://security.archlinux.org/ASA-202002-5
12
reference_url https://security.archlinux.org/ASA-202002-9
reference_id ASA-202002-9
reference_type
scores
url https://security.archlinux.org/ASA-202002-9
13
reference_url https://security.archlinux.org/AVG-1096
reference_id AVG-1096
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1096
14
reference_url https://security.archlinux.org/AVG-1099
reference_id AVG-1099
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1099
15
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
16
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
reference_id mfsa2020-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
reference_id mfsa2020-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
reference_id mfsa2020-07
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
20
reference_url https://access.redhat.com/errata/RHSA-2020:0512
reference_id RHSA-2020:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0512
21
reference_url https://access.redhat.com/errata/RHSA-2020:0519
reference_id RHSA-2020:0519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0519
22
reference_url https://access.redhat.com/errata/RHSA-2020:0520
reference_id RHSA-2020:0520
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0520
23
reference_url https://access.redhat.com/errata/RHSA-2020:0521
reference_id RHSA-2020:0521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0521
24
reference_url https://access.redhat.com/errata/RHSA-2020:0565
reference_id RHSA-2020:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0565
25
reference_url https://access.redhat.com/errata/RHSA-2020:0574
reference_id RHSA-2020:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0574
26
reference_url https://access.redhat.com/errata/RHSA-2020:0576
reference_id RHSA-2020:0576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0576
27
reference_url https://access.redhat.com/errata/RHSA-2020:0577
reference_id RHSA-2020:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0577
28
reference_url https://usn.ubuntu.com/4278-1/
reference_id USN-4278-1
reference_type
scores
url https://usn.ubuntu.com/4278-1/
29
reference_url https://usn.ubuntu.com/4278-2/
reference_id USN-4278-2
reference_type
scores
url https://usn.ubuntu.com/4278-2/
30
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
31
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2020-6798
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rszh-1c16-47ah
16
url VCID-t4eb-c363-u7hc
vulnerability_id VCID-t4eb-c363-u7hc
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6805.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6805.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6805
reference_id
reference_type
scores
0
value 0.00853
scoring_system epss
scoring_elements 0.74928
published_at 2026-04-13T12:55:00Z
1
value 0.00853
scoring_system epss
scoring_elements 0.74938
published_at 2026-04-12T12:55:00Z
2
value 0.00853
scoring_system epss
scoring_elements 0.74887
published_at 2026-04-01T12:55:00Z
3
value 0.00853
scoring_system epss
scoring_elements 0.74959
published_at 2026-04-11T12:55:00Z
4
value 0.00853
scoring_system epss
scoring_elements 0.74937
published_at 2026-04-09T12:55:00Z
5
value 0.00853
scoring_system epss
scoring_elements 0.74924
published_at 2026-04-08T12:55:00Z
6
value 0.00853
scoring_system epss
scoring_elements 0.74891
published_at 2026-04-07T12:55:00Z
7
value 0.00853
scoring_system epss
scoring_elements 0.74889
published_at 2026-04-02T12:55:00Z
8
value 0.00853
scoring_system epss
scoring_elements 0.74917
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6805
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1610880
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1610880
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://www.mozilla.org/security/advisories/mfsa2020-08/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-08/
12
reference_url https://www.mozilla.org/security/advisories/mfsa2020-09/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-09/
13
reference_url https://www.mozilla.org/security/advisories/mfsa2020-10/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-10/
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1812199
reference_id 1812199
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1812199
15
reference_url https://security.archlinux.org/ASA-202003-11
reference_id ASA-202003-11
reference_type
scores
url https://security.archlinux.org/ASA-202003-11
16
reference_url https://security.archlinux.org/ASA-202003-8
reference_id ASA-202003-8
reference_type
scores
url https://security.archlinux.org/ASA-202003-8
17
reference_url https://security.archlinux.org/AVG-1112
reference_id AVG-1112
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1112
18
reference_url https://security.archlinux.org/AVG-1115
reference_id AVG-1115
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1115
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-6805
reference_id CVE-2020-6805
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-6805
26
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
27
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
reference_id mfsa2020-08
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
reference_id mfsa2020-09
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
reference_id mfsa2020-10
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
31
reference_url https://access.redhat.com/errata/RHSA-2020:0815
reference_id RHSA-2020:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0815
32
reference_url https://access.redhat.com/errata/RHSA-2020:0816
reference_id RHSA-2020:0816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0816
33
reference_url https://access.redhat.com/errata/RHSA-2020:0819
reference_id RHSA-2020:0819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0819
34
reference_url https://access.redhat.com/errata/RHSA-2020:0820
reference_id RHSA-2020:0820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0820
35
reference_url https://access.redhat.com/errata/RHSA-2020:0905
reference_id RHSA-2020:0905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0905
36
reference_url https://access.redhat.com/errata/RHSA-2020:0914
reference_id RHSA-2020:0914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0914
37
reference_url https://access.redhat.com/errata/RHSA-2020:0918
reference_id RHSA-2020:0918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0918
38
reference_url https://access.redhat.com/errata/RHSA-2020:0919
reference_id RHSA-2020:0919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0919
39
reference_url https://usn.ubuntu.com/4299-1/
reference_id USN-4299-1
reference_type
scores
url https://usn.ubuntu.com/4299-1/
40
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
41
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2020-6805
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t4eb-c363-u7hc
17
url VCID-tvsp-tsfk-v7eg
vulnerability_id VCID-tvsp-tsfk-v7eg
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11759.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11759.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11759
reference_id
reference_type
scores
0
value 0.0251
scoring_system epss
scoring_elements 0.85368
published_at 2026-04-13T12:55:00Z
1
value 0.0251
scoring_system epss
scoring_elements 0.85329
published_at 2026-04-07T12:55:00Z
2
value 0.0251
scoring_system epss
scoring_elements 0.85351
published_at 2026-04-08T12:55:00Z
3
value 0.0251
scoring_system epss
scoring_elements 0.85359
published_at 2026-04-09T12:55:00Z
4
value 0.0251
scoring_system epss
scoring_elements 0.85373
published_at 2026-04-11T12:55:00Z
5
value 0.0251
scoring_system epss
scoring_elements 0.85371
published_at 2026-04-12T12:55:00Z
6
value 0.0251
scoring_system epss
scoring_elements 0.85296
published_at 2026-04-01T12:55:00Z
7
value 0.0251
scoring_system epss
scoring_elements 0.85309
published_at 2026-04-02T12:55:00Z
8
value 0.0251
scoring_system epss
scoring_elements 0.85327
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11759
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1764440
reference_id 1764440
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1764440
12
reference_url https://security.archlinux.org/ASA-201910-15
reference_id ASA-201910-15
reference_type
scores
url https://security.archlinux.org/ASA-201910-15
13
reference_url https://security.archlinux.org/ASA-201910-16
reference_id ASA-201910-16
reference_type
scores
url https://security.archlinux.org/ASA-201910-16
14
reference_url https://security.archlinux.org/AVG-1054
reference_id AVG-1054
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1054
15
reference_url https://security.archlinux.org/AVG-1055
reference_id AVG-1055
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1055
16
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
reference_id mfsa2019-33
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
reference_id mfsa2019-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
reference_id mfsa2019-35
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
20
reference_url https://access.redhat.com/errata/RHSA-2019:3193
reference_id RHSA-2019:3193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3193
21
reference_url https://access.redhat.com/errata/RHSA-2019:3196
reference_id RHSA-2019:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3196
22
reference_url https://access.redhat.com/errata/RHSA-2019:3210
reference_id RHSA-2019:3210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3210
23
reference_url https://access.redhat.com/errata/RHSA-2019:3237
reference_id RHSA-2019:3237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3237
24
reference_url https://access.redhat.com/errata/RHSA-2019:3281
reference_id RHSA-2019:3281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3281
25
reference_url https://access.redhat.com/errata/RHSA-2019:3756
reference_id RHSA-2019:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3756
26
reference_url https://usn.ubuntu.com/4165-1/
reference_id USN-4165-1
reference_type
scores
url https://usn.ubuntu.com/4165-1/
27
reference_url https://usn.ubuntu.com/4202-1/
reference_id USN-4202-1
reference_type
scores
url https://usn.ubuntu.com/4202-1/
28
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2019-11759
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tvsp-tsfk-v7eg
18
url VCID-vzb9-aeqz-hybr
vulnerability_id VCID-vzb9-aeqz-hybr
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11745.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11745.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11745
reference_id
reference_type
scores
0
value 0.00806
scoring_system epss
scoring_elements 0.74149
published_at 2026-04-13T12:55:00Z
1
value 0.00806
scoring_system epss
scoring_elements 0.74133
published_at 2026-04-04T12:55:00Z
2
value 0.00806
scoring_system epss
scoring_elements 0.74105
published_at 2026-04-07T12:55:00Z
3
value 0.00806
scoring_system epss
scoring_elements 0.74137
published_at 2026-04-08T12:55:00Z
4
value 0.00806
scoring_system epss
scoring_elements 0.74152
published_at 2026-04-09T12:55:00Z
5
value 0.00806
scoring_system epss
scoring_elements 0.74174
published_at 2026-04-11T12:55:00Z
6
value 0.00806
scoring_system epss
scoring_elements 0.74155
published_at 2026-04-12T12:55:00Z
7
value 0.00806
scoring_system epss
scoring_elements 0.74101
published_at 2026-04-01T12:55:00Z
8
value 0.00806
scoring_system epss
scoring_elements 0.74107
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17007
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1774831
reference_id 1774831
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1774831
6
reference_url https://security.archlinux.org/ASA-201912-1
reference_id ASA-201912-1
reference_type
scores
url https://security.archlinux.org/ASA-201912-1
7
reference_url https://security.archlinux.org/ASA-201912-2
reference_id ASA-201912-2
reference_type
scores
url https://security.archlinux.org/ASA-201912-2
8
reference_url https://security.archlinux.org/AVG-1071
reference_id AVG-1071
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1071
9
reference_url https://security.archlinux.org/AVG-1072
reference_id AVG-1072
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1072
10
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
11
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
12
reference_url https://security.gentoo.org/glsa/202003-37
reference_id GLSA-202003-37
reference_type
scores
url https://security.gentoo.org/glsa/202003-37
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
reference_id mfsa2019-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
reference_id mfsa2019-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
reference_id mfsa2019-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
16
reference_url https://access.redhat.com/errata/RHSA-2019:4114
reference_id RHSA-2019:4114
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4114
17
reference_url https://access.redhat.com/errata/RHSA-2019:4152
reference_id RHSA-2019:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4152
18
reference_url https://access.redhat.com/errata/RHSA-2019:4190
reference_id RHSA-2019:4190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4190
19
reference_url https://access.redhat.com/errata/RHSA-2020:0243
reference_id RHSA-2020:0243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0243
20
reference_url https://access.redhat.com/errata/RHSA-2020:0466
reference_id RHSA-2020:0466
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0466
21
reference_url https://access.redhat.com/errata/RHSA-2020:1267
reference_id RHSA-2020:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1267
22
reference_url https://access.redhat.com/errata/RHSA-2020:1345
reference_id RHSA-2020:1345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1345
23
reference_url https://access.redhat.com/errata/RHSA-2020:1461
reference_id RHSA-2020:1461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1461
24
reference_url https://usn.ubuntu.com/4203-1/
reference_id USN-4203-1
reference_type
scores
url https://usn.ubuntu.com/4203-1/
25
reference_url https://usn.ubuntu.com/4203-2/
reference_id USN-4203-2
reference_type
scores
url https://usn.ubuntu.com/4203-2/
26
reference_url https://usn.ubuntu.com/4216-1/
reference_id USN-4216-1
reference_type
scores
url https://usn.ubuntu.com/4216-1/
27
reference_url https://usn.ubuntu.com/4216-2/
reference_id USN-4216-2
reference_type
scores
url https://usn.ubuntu.com/4216-2/
28
reference_url https://usn.ubuntu.com/4241-1/
reference_id USN-4241-1
reference_type
scores
url https://usn.ubuntu.com/4241-1/
29
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2019-11745
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vzb9-aeqz-hybr
19
url VCID-wpm1-y59u-zkgu
vulnerability_id VCID-wpm1-y59u-zkgu
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6807.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6807.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6807
reference_id
reference_type
scores
0
value 0.00779
scoring_system epss
scoring_elements 0.73668
published_at 2026-04-13T12:55:00Z
1
value 0.00779
scoring_system epss
scoring_elements 0.73676
published_at 2026-04-12T12:55:00Z
2
value 0.00779
scoring_system epss
scoring_elements 0.73616
published_at 2026-04-01T12:55:00Z
3
value 0.00779
scoring_system epss
scoring_elements 0.73694
published_at 2026-04-11T12:55:00Z
4
value 0.00779
scoring_system epss
scoring_elements 0.73671
published_at 2026-04-09T12:55:00Z
5
value 0.00779
scoring_system epss
scoring_elements 0.73658
published_at 2026-04-08T12:55:00Z
6
value 0.00779
scoring_system epss
scoring_elements 0.73622
published_at 2026-04-07T12:55:00Z
7
value 0.00779
scoring_system epss
scoring_elements 0.73627
published_at 2026-04-02T12:55:00Z
8
value 0.00779
scoring_system epss
scoring_elements 0.73651
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6807
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1614971
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1614971
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://www.mozilla.org/security/advisories/mfsa2020-08/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-08/
12
reference_url https://www.mozilla.org/security/advisories/mfsa2020-09/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-09/
13
reference_url https://www.mozilla.org/security/advisories/mfsa2020-10/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-10/
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1812201
reference_id 1812201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1812201
15
reference_url https://security.archlinux.org/ASA-202003-11
reference_id ASA-202003-11
reference_type
scores
url https://security.archlinux.org/ASA-202003-11
16
reference_url https://security.archlinux.org/ASA-202003-8
reference_id ASA-202003-8
reference_type
scores
url https://security.archlinux.org/ASA-202003-8
17
reference_url https://security.archlinux.org/AVG-1112
reference_id AVG-1112
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1112
18
reference_url https://security.archlinux.org/AVG-1115
reference_id AVG-1115
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1115
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-6807
reference_id CVE-2020-6807
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-6807
26
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
27
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
reference_id mfsa2020-08
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
reference_id mfsa2020-09
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
reference_id mfsa2020-10
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
31
reference_url https://access.redhat.com/errata/RHSA-2020:0815
reference_id RHSA-2020:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0815
32
reference_url https://access.redhat.com/errata/RHSA-2020:0816
reference_id RHSA-2020:0816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0816
33
reference_url https://access.redhat.com/errata/RHSA-2020:0819
reference_id RHSA-2020:0819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0819
34
reference_url https://access.redhat.com/errata/RHSA-2020:0820
reference_id RHSA-2020:0820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0820
35
reference_url https://access.redhat.com/errata/RHSA-2020:0905
reference_id RHSA-2020:0905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0905
36
reference_url https://access.redhat.com/errata/RHSA-2020:0914
reference_id RHSA-2020:0914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0914
37
reference_url https://access.redhat.com/errata/RHSA-2020:0918
reference_id RHSA-2020:0918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0918
38
reference_url https://access.redhat.com/errata/RHSA-2020:0919
reference_id RHSA-2020:0919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0919
39
reference_url https://usn.ubuntu.com/4299-1/
reference_id USN-4299-1
reference_type
scores
url https://usn.ubuntu.com/4299-1/
40
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
41
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2020-6807
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wpm1-y59u-zkgu
20
url VCID-wpvp-c7aw-qfhw
vulnerability_id VCID-wpvp-c7aw-qfhw
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11761.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11761.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11761
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.63283
published_at 2026-04-13T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.6325
published_at 2026-04-07T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63301
published_at 2026-04-08T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.63319
published_at 2026-04-09T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.63336
published_at 2026-04-11T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.6332
published_at 2026-04-12T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.63196
published_at 2026-04-01T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.63256
published_at 2026-04-02T12:55:00Z
8
value 0.00442
scoring_system epss
scoring_elements 0.63285
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11761
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1764442
reference_id 1764442
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1764442
12
reference_url https://security.archlinux.org/ASA-201910-15
reference_id ASA-201910-15
reference_type
scores
url https://security.archlinux.org/ASA-201910-15
13
reference_url https://security.archlinux.org/ASA-201910-16
reference_id ASA-201910-16
reference_type
scores
url https://security.archlinux.org/ASA-201910-16
14
reference_url https://security.archlinux.org/AVG-1054
reference_id AVG-1054
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1054
15
reference_url https://security.archlinux.org/AVG-1055
reference_id AVG-1055
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1055
16
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
reference_id mfsa2019-33
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-33
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
reference_id mfsa2019-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-34
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
reference_id mfsa2019-35
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-35
20
reference_url https://access.redhat.com/errata/RHSA-2019:3193
reference_id RHSA-2019:3193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3193
21
reference_url https://access.redhat.com/errata/RHSA-2019:3196
reference_id RHSA-2019:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3196
22
reference_url https://access.redhat.com/errata/RHSA-2019:3210
reference_id RHSA-2019:3210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3210
23
reference_url https://access.redhat.com/errata/RHSA-2019:3237
reference_id RHSA-2019:3237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3237
24
reference_url https://access.redhat.com/errata/RHSA-2019:3281
reference_id RHSA-2019:3281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3281
25
reference_url https://access.redhat.com/errata/RHSA-2019:3756
reference_id RHSA-2019:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3756
26
reference_url https://usn.ubuntu.com/4165-1/
reference_id USN-4165-1
reference_type
scores
url https://usn.ubuntu.com/4165-1/
27
reference_url https://usn.ubuntu.com/4202-1/
reference_id USN-4202-1
reference_type
scores
url https://usn.ubuntu.com/4202-1/
28
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2019-11761
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wpvp-c7aw-qfhw
21
url VCID-x4vq-y6b6-dqf6
vulnerability_id VCID-x4vq-y6b6-dqf6
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url http://packetstormsecurity.com/files/157524/Firefox-js-ReadableStreamCloseInternal-Out-Of-Bounds-Access.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/157524/Firefox-js-ReadableStreamCloseInternal-Out-Of-Bounds-Access.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6806.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6806.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6806
reference_id
reference_type
scores
0
value 0.03504
scoring_system epss
scoring_elements 0.87614
published_at 2026-04-13T12:55:00Z
1
value 0.03504
scoring_system epss
scoring_elements 0.87617
published_at 2026-04-12T12:55:00Z
2
value 0.03504
scoring_system epss
scoring_elements 0.87559
published_at 2026-04-01T12:55:00Z
3
value 0.03504
scoring_system epss
scoring_elements 0.87622
published_at 2026-04-11T12:55:00Z
4
value 0.03504
scoring_system epss
scoring_elements 0.8761
published_at 2026-04-09T12:55:00Z
5
value 0.03504
scoring_system epss
scoring_elements 0.87604
published_at 2026-04-08T12:55:00Z
6
value 0.03504
scoring_system epss
scoring_elements 0.87585
published_at 2026-04-07T12:55:00Z
7
value 0.03504
scoring_system epss
scoring_elements 0.87569
published_at 2026-04-02T12:55:00Z
8
value 0.03504
scoring_system epss
scoring_elements 0.87582
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6806
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1612308
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1612308
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://www.mozilla.org/security/advisories/mfsa2020-08/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-08/
13
reference_url https://www.mozilla.org/security/advisories/mfsa2020-09/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-09/
14
reference_url https://www.mozilla.org/security/advisories/mfsa2020-10/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-10/
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1812200
reference_id 1812200
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1812200
16
reference_url https://security.archlinux.org/ASA-202003-11
reference_id ASA-202003-11
reference_type
scores
url https://security.archlinux.org/ASA-202003-11
17
reference_url https://security.archlinux.org/ASA-202003-8
reference_id ASA-202003-8
reference_type
scores
url https://security.archlinux.org/ASA-202003-8
18
reference_url https://security.archlinux.org/AVG-1112
reference_id AVG-1112
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1112
19
reference_url https://security.archlinux.org/AVG-1115
reference_id AVG-1115
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1115
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-6806
reference_id CVE-2020-6806
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-6806
27
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
28
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
reference_id mfsa2020-08
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
reference_id mfsa2020-09
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
31
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
reference_id mfsa2020-10
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
32
reference_url https://access.redhat.com/errata/RHSA-2020:0815
reference_id RHSA-2020:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0815
33
reference_url https://access.redhat.com/errata/RHSA-2020:0816
reference_id RHSA-2020:0816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0816
34
reference_url https://access.redhat.com/errata/RHSA-2020:0819
reference_id RHSA-2020:0819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0819
35
reference_url https://access.redhat.com/errata/RHSA-2020:0820
reference_id RHSA-2020:0820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0820
36
reference_url https://access.redhat.com/errata/RHSA-2020:0905
reference_id RHSA-2020:0905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0905
37
reference_url https://access.redhat.com/errata/RHSA-2020:0914
reference_id RHSA-2020:0914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0914
38
reference_url https://access.redhat.com/errata/RHSA-2020:0918
reference_id RHSA-2020:0918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0918
39
reference_url https://access.redhat.com/errata/RHSA-2020:0919
reference_id RHSA-2020:0919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0919
40
reference_url https://usn.ubuntu.com/4299-1/
reference_id USN-4299-1
reference_type
scores
url https://usn.ubuntu.com/4299-1/
41
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
42
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2020-6806
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x4vq-y6b6-dqf6
22
url VCID-y8vr-48q8-a3aj
vulnerability_id VCID-y8vr-48q8-a3aj
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6800.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6800.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6800
reference_id
reference_type
scores
0
value 0.0125
scoring_system epss
scoring_elements 0.7933
published_at 2026-04-13T12:55:00Z
1
value 0.0125
scoring_system epss
scoring_elements 0.79312
published_at 2026-04-04T12:55:00Z
2
value 0.0125
scoring_system epss
scoring_elements 0.79298
published_at 2026-04-07T12:55:00Z
3
value 0.0125
scoring_system epss
scoring_elements 0.79323
published_at 2026-04-08T12:55:00Z
4
value 0.0125
scoring_system epss
scoring_elements 0.79333
published_at 2026-04-09T12:55:00Z
5
value 0.0125
scoring_system epss
scoring_elements 0.79357
published_at 2026-04-11T12:55:00Z
6
value 0.0125
scoring_system epss
scoring_elements 0.79341
published_at 2026-04-12T12:55:00Z
7
value 0.0125
scoring_system epss
scoring_elements 0.79281
published_at 2026-04-01T12:55:00Z
8
value 0.0125
scoring_system epss
scoring_elements 0.79288
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6800
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801920
reference_id 1801920
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801920
11
reference_url https://security.archlinux.org/ASA-202002-5
reference_id ASA-202002-5
reference_type
scores
url https://security.archlinux.org/ASA-202002-5
12
reference_url https://security.archlinux.org/ASA-202002-9
reference_id ASA-202002-9
reference_type
scores
url https://security.archlinux.org/ASA-202002-9
13
reference_url https://security.archlinux.org/AVG-1096
reference_id AVG-1096
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1096
14
reference_url https://security.archlinux.org/AVG-1099
reference_id AVG-1099
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1099
15
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
16
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
reference_id mfsa2020-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
reference_id mfsa2020-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
reference_id mfsa2020-07
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
20
reference_url https://access.redhat.com/errata/RHSA-2020:0512
reference_id RHSA-2020:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0512
21
reference_url https://access.redhat.com/errata/RHSA-2020:0519
reference_id RHSA-2020:0519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0519
22
reference_url https://access.redhat.com/errata/RHSA-2020:0520
reference_id RHSA-2020:0520
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0520
23
reference_url https://access.redhat.com/errata/RHSA-2020:0521
reference_id RHSA-2020:0521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0521
24
reference_url https://access.redhat.com/errata/RHSA-2020:0565
reference_id RHSA-2020:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0565
25
reference_url https://access.redhat.com/errata/RHSA-2020:0574
reference_id RHSA-2020:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0574
26
reference_url https://access.redhat.com/errata/RHSA-2020:0576
reference_id RHSA-2020:0576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0576
27
reference_url https://access.redhat.com/errata/RHSA-2020:0577
reference_id RHSA-2020:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0577
28
reference_url https://usn.ubuntu.com/4278-1/
reference_id USN-4278-1
reference_type
scores
url https://usn.ubuntu.com/4278-1/
29
reference_url https://usn.ubuntu.com/4278-2/
reference_id USN-4278-2
reference_type
scores
url https://usn.ubuntu.com/4278-2/
30
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
31
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2020-6800
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y8vr-48q8-a3aj
23
url VCID-yr3c-1cqv-n3bw
vulnerability_id VCID-yr3c-1cqv-n3bw
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6812.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6812.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6812
reference_id
reference_type
scores
0
value 0.00581
scoring_system epss
scoring_elements 0.68908
published_at 2026-04-13T12:55:00Z
1
value 0.00581
scoring_system epss
scoring_elements 0.68937
published_at 2026-04-12T12:55:00Z
2
value 0.00581
scoring_system epss
scoring_elements 0.68842
published_at 2026-04-01T12:55:00Z
3
value 0.00581
scoring_system epss
scoring_elements 0.68951
published_at 2026-04-11T12:55:00Z
4
value 0.00581
scoring_system epss
scoring_elements 0.68929
published_at 2026-04-09T12:55:00Z
5
value 0.00581
scoring_system epss
scoring_elements 0.6891
published_at 2026-04-08T12:55:00Z
6
value 0.00581
scoring_system epss
scoring_elements 0.6886
published_at 2026-04-07T12:55:00Z
7
value 0.00581
scoring_system epss
scoring_elements 0.68859
published_at 2026-04-02T12:55:00Z
8
value 0.00581
scoring_system epss
scoring_elements 0.6888
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6812
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1616661
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1616661
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://www.mozilla.org/security/advisories/mfsa2020-08/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-08/
12
reference_url https://www.mozilla.org/security/advisories/mfsa2020-09/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-09/
13
reference_url https://www.mozilla.org/security/advisories/mfsa2020-10/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-10/
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1812204
reference_id 1812204
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1812204
15
reference_url https://security.archlinux.org/ASA-202003-11
reference_id ASA-202003-11
reference_type
scores
url https://security.archlinux.org/ASA-202003-11
16
reference_url https://security.archlinux.org/ASA-202003-8
reference_id ASA-202003-8
reference_type
scores
url https://security.archlinux.org/ASA-202003-8
17
reference_url https://security.archlinux.org/AVG-1112
reference_id AVG-1112
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1112
18
reference_url https://security.archlinux.org/AVG-1115
reference_id AVG-1115
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1115
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-6812
reference_id CVE-2020-6812
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-6812
26
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
27
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
reference_id mfsa2020-08
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
reference_id mfsa2020-09
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
reference_id mfsa2020-10
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
31
reference_url https://access.redhat.com/errata/RHSA-2020:0815
reference_id RHSA-2020:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0815
32
reference_url https://access.redhat.com/errata/RHSA-2020:0816
reference_id RHSA-2020:0816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0816
33
reference_url https://access.redhat.com/errata/RHSA-2020:0819
reference_id RHSA-2020:0819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0819
34
reference_url https://access.redhat.com/errata/RHSA-2020:0820
reference_id RHSA-2020:0820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0820
35
reference_url https://access.redhat.com/errata/RHSA-2020:0905
reference_id RHSA-2020:0905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0905
36
reference_url https://access.redhat.com/errata/RHSA-2020:0914
reference_id RHSA-2020:0914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0914
37
reference_url https://access.redhat.com/errata/RHSA-2020:0918
reference_id RHSA-2020:0918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0918
38
reference_url https://access.redhat.com/errata/RHSA-2020:0919
reference_id RHSA-2020:0919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0919
39
reference_url https://usn.ubuntu.com/4299-1/
reference_id USN-4299-1
reference_type
scores
url https://usn.ubuntu.com/4299-1/
40
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
41
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2020-6812
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yr3c-1cqv-n3bw
24
url VCID-zh2m-qyw5-dkgn
vulnerability_id VCID-zh2m-qyw5-dkgn
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17011.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17011.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17011
reference_id
reference_type
scores
0
value 0.01329
scoring_system epss
scoring_elements 0.79939
published_at 2026-04-13T12:55:00Z
1
value 0.01329
scoring_system epss
scoring_elements 0.79919
published_at 2026-04-04T12:55:00Z
2
value 0.01329
scoring_system epss
scoring_elements 0.79907
published_at 2026-04-07T12:55:00Z
3
value 0.01329
scoring_system epss
scoring_elements 0.79935
published_at 2026-04-08T12:55:00Z
4
value 0.01329
scoring_system epss
scoring_elements 0.79943
published_at 2026-04-09T12:55:00Z
5
value 0.01329
scoring_system epss
scoring_elements 0.79963
published_at 2026-04-11T12:55:00Z
6
value 0.01329
scoring_system epss
scoring_elements 0.79947
published_at 2026-04-12T12:55:00Z
7
value 0.01329
scoring_system epss
scoring_elements 0.79891
published_at 2026-04-01T12:55:00Z
8
value 0.01329
scoring_system epss
scoring_elements 0.79898
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17011
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1779436
reference_id 1779436
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1779436
9
reference_url https://security.archlinux.org/ASA-201912-1
reference_id ASA-201912-1
reference_type
scores
url https://security.archlinux.org/ASA-201912-1
10
reference_url https://security.archlinux.org/ASA-201912-2
reference_id ASA-201912-2
reference_type
scores
url https://security.archlinux.org/ASA-201912-2
11
reference_url https://security.archlinux.org/AVG-1071
reference_id AVG-1071
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1071
12
reference_url https://security.archlinux.org/AVG-1072
reference_id AVG-1072
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1072
13
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
14
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
reference_id mfsa2019-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
reference_id mfsa2019-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
reference_id mfsa2019-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
18
reference_url https://access.redhat.com/errata/RHSA-2019:4107
reference_id RHSA-2019:4107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4107
19
reference_url https://access.redhat.com/errata/RHSA-2019:4108
reference_id RHSA-2019:4108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4108
20
reference_url https://access.redhat.com/errata/RHSA-2019:4111
reference_id RHSA-2019:4111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4111
21
reference_url https://access.redhat.com/errata/RHSA-2019:4148
reference_id RHSA-2019:4148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4148
22
reference_url https://access.redhat.com/errata/RHSA-2019:4195
reference_id RHSA-2019:4195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4195
23
reference_url https://access.redhat.com/errata/RHSA-2019:4205
reference_id RHSA-2019:4205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4205
24
reference_url https://access.redhat.com/errata/RHSA-2020:0292
reference_id RHSA-2020:0292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0292
25
reference_url https://access.redhat.com/errata/RHSA-2020:0295
reference_id RHSA-2020:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0295
26
reference_url https://usn.ubuntu.com/4216-1/
reference_id USN-4216-1
reference_type
scores
url https://usn.ubuntu.com/4216-1/
27
reference_url https://usn.ubuntu.com/4216-2/
reference_id USN-4216-2
reference_type
scores
url https://usn.ubuntu.com/4216-2/
28
reference_url https://usn.ubuntu.com/4241-1/
reference_id USN-4241-1
reference_type
scores
url https://usn.ubuntu.com/4241-1/
29
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2019-17011
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zh2m-qyw5-dkgn
25
url VCID-zstj-sux9-ubdd
vulnerability_id VCID-zstj-sux9-ubdd
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17010.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17010.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17010
reference_id
reference_type
scores
0
value 0.01329
scoring_system epss
scoring_elements 0.79939
published_at 2026-04-13T12:55:00Z
1
value 0.01329
scoring_system epss
scoring_elements 0.79919
published_at 2026-04-04T12:55:00Z
2
value 0.01329
scoring_system epss
scoring_elements 0.79907
published_at 2026-04-07T12:55:00Z
3
value 0.01329
scoring_system epss
scoring_elements 0.79935
published_at 2026-04-08T12:55:00Z
4
value 0.01329
scoring_system epss
scoring_elements 0.79943
published_at 2026-04-09T12:55:00Z
5
value 0.01329
scoring_system epss
scoring_elements 0.79963
published_at 2026-04-11T12:55:00Z
6
value 0.01329
scoring_system epss
scoring_elements 0.79947
published_at 2026-04-12T12:55:00Z
7
value 0.01329
scoring_system epss
scoring_elements 0.79891
published_at 2026-04-01T12:55:00Z
8
value 0.01329
scoring_system epss
scoring_elements 0.79898
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17010
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1779434
reference_id 1779434
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1779434
9
reference_url https://security.archlinux.org/ASA-201912-1
reference_id ASA-201912-1
reference_type
scores
url https://security.archlinux.org/ASA-201912-1
10
reference_url https://security.archlinux.org/ASA-201912-2
reference_id ASA-201912-2
reference_type
scores
url https://security.archlinux.org/ASA-201912-2
11
reference_url https://security.archlinux.org/AVG-1071
reference_id AVG-1071
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1071
12
reference_url https://security.archlinux.org/AVG-1072
reference_id AVG-1072
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1072
13
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
14
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
reference_id mfsa2019-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
reference_id mfsa2019-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
reference_id mfsa2019-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
18
reference_url https://access.redhat.com/errata/RHSA-2019:4107
reference_id RHSA-2019:4107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4107
19
reference_url https://access.redhat.com/errata/RHSA-2019:4108
reference_id RHSA-2019:4108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4108
20
reference_url https://access.redhat.com/errata/RHSA-2019:4111
reference_id RHSA-2019:4111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4111
21
reference_url https://access.redhat.com/errata/RHSA-2019:4148
reference_id RHSA-2019:4148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4148
22
reference_url https://access.redhat.com/errata/RHSA-2019:4195
reference_id RHSA-2019:4195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4195
23
reference_url https://access.redhat.com/errata/RHSA-2019:4205
reference_id RHSA-2019:4205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4205
24
reference_url https://access.redhat.com/errata/RHSA-2020:0292
reference_id RHSA-2020:0292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0292
25
reference_url https://access.redhat.com/errata/RHSA-2020:0295
reference_id RHSA-2020:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0295
26
reference_url https://usn.ubuntu.com/4216-1/
reference_id USN-4216-1
reference_type
scores
url https://usn.ubuntu.com/4216-1/
27
reference_url https://usn.ubuntu.com/4216-2/
reference_id USN-4216-2
reference_type
scores
url https://usn.ubuntu.com/4216-2/
28
reference_url https://usn.ubuntu.com/4241-1/
reference_id USN-4241-1
reference_type
scores
url https://usn.ubuntu.com/4241-1/
29
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@68.6.0
purl pkg:ebuild/mail-client/thunderbird-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0
aliases CVE-2019-17010
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zstj-sux9-ubdd
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0