Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/mail-client/thunderbird@128.4.0
Typeebuild
Namespacemail-client
Namethunderbird
Version128.4.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version128.9.0
Latest_non_vulnerable_version128.9.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-19vv-zhum-43hp
vulnerability_id VCID-19vv-zhum-43hp
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10468.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10468.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10468
reference_id
reference_type
scores
0
value 0.00271
scoring_system epss
scoring_elements 0.50586
published_at 2026-04-18T12:55:00Z
1
value 0.00271
scoring_system epss
scoring_elements 0.50503
published_at 2026-04-02T12:55:00Z
2
value 0.00271
scoring_system epss
scoring_elements 0.5053
published_at 2026-04-04T12:55:00Z
3
value 0.00271
scoring_system epss
scoring_elements 0.50484
published_at 2026-04-07T12:55:00Z
4
value 0.00271
scoring_system epss
scoring_elements 0.50538
published_at 2026-04-08T12:55:00Z
5
value 0.00271
scoring_system epss
scoring_elements 0.50535
published_at 2026-04-09T12:55:00Z
6
value 0.00271
scoring_system epss
scoring_elements 0.50577
published_at 2026-04-11T12:55:00Z
7
value 0.00271
scoring_system epss
scoring_elements 0.50553
published_at 2026-04-12T12:55:00Z
8
value 0.00271
scoring_system epss
scoring_elements 0.50539
published_at 2026-04-13T12:55:00Z
9
value 0.00271
scoring_system epss
scoring_elements 0.50581
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10468
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322443
reference_id 2322443
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322443
4
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
5
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
reference_id mfsa2024-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-55/
reference_id mfsa2024-55
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:16:38Z/
url https://www.mozilla.org/security/advisories/mfsa2024-55/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
reference_id mfsa2024-59
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-59/
reference_id mfsa2024-59
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:16:38Z/
url https://www.mozilla.org/security/advisories/mfsa2024-59/
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1914982
reference_id show_bug.cgi?id=1914982
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:16:38Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1914982
12
reference_url https://usn.ubuntu.com/7086-1/
reference_id USN-7086-1
reference_type
scores
url https://usn.ubuntu.com/7086-1/
13
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-10468
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-19vv-zhum-43hp
1
url VCID-1z5d-4wfm-8yfk
vulnerability_id VCID-1z5d-4wfm-8yfk
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9396.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9396.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9396
reference_id
reference_type
scores
0
value 0.00179
scoring_system epss
scoring_elements 0.39559
published_at 2026-04-18T12:55:00Z
1
value 0.00179
scoring_system epss
scoring_elements 0.39589
published_at 2026-04-16T12:55:00Z
2
value 0.00179
scoring_system epss
scoring_elements 0.39539
published_at 2026-04-13T12:55:00Z
3
value 0.00179
scoring_system epss
scoring_elements 0.39574
published_at 2026-04-02T12:55:00Z
4
value 0.00179
scoring_system epss
scoring_elements 0.39567
published_at 2026-04-08T12:55:00Z
5
value 0.00179
scoring_system epss
scoring_elements 0.39513
published_at 2026-04-07T12:55:00Z
6
value 0.00179
scoring_system epss
scoring_elements 0.39597
published_at 2026-04-04T12:55:00Z
7
value 0.00179
scoring_system epss
scoring_elements 0.39555
published_at 2026-04-12T12:55:00Z
8
value 0.00179
scoring_system epss
scoring_elements 0.39593
published_at 2026-04-11T12:55:00Z
9
value 0.00179
scoring_system epss
scoring_elements 0.39583
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9396
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315954
reference_id 2315954
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315954
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:12:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:12:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:12:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:12:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
15
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
16
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
17
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
18
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
19
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
20
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
21
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
22
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
23
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
24
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
25
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
26
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
27
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
28
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
29
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
30
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
31
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1912471
reference_id show_bug.cgi?id=1912471
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:12:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1912471
32
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
33
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-9396
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1z5d-4wfm-8yfk
2
url VCID-2cuh-xyst-rbgv
vulnerability_id VCID-2cuh-xyst-rbgv
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7518.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7518.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7518
reference_id
reference_type
scores
0
value 0.00318
scoring_system epss
scoring_elements 0.54899
published_at 2026-04-18T12:55:00Z
1
value 0.00318
scoring_system epss
scoring_elements 0.54897
published_at 2026-04-16T12:55:00Z
2
value 0.00318
scoring_system epss
scoring_elements 0.54848
published_at 2026-04-02T12:55:00Z
3
value 0.00318
scoring_system epss
scoring_elements 0.54891
published_at 2026-04-08T12:55:00Z
4
value 0.00318
scoring_system epss
scoring_elements 0.54841
published_at 2026-04-07T12:55:00Z
5
value 0.00318
scoring_system epss
scoring_elements 0.54872
published_at 2026-04-04T12:55:00Z
6
value 0.00318
scoring_system epss
scoring_elements 0.54859
published_at 2026-04-13T12:55:00Z
7
value 0.00318
scoring_system epss
scoring_elements 0.54883
published_at 2026-04-12T12:55:00Z
8
value 0.00318
scoring_system epss
scoring_elements 0.549
published_at 2026-04-11T12:55:00Z
9
value 0.00318
scoring_system epss
scoring_elements 0.54888
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7518
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303135
reference_id 2303135
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303135
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T17:58:37Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T17:58:37Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T17:58:37Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
13
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
14
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
15
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
16
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
17
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
18
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
19
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
20
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
21
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
22
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
23
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
24
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
25
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
26
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
27
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
28
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
29
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
30
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1875354
reference_id show_bug.cgi?id=1875354
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T17:58:37Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1875354
31
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-7518
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2cuh-xyst-rbgv
3
url VCID-2pvz-3cmq-53dk
vulnerability_id VCID-2pvz-3cmq-53dk
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7519.json
reference_id
reference_type
scores
0
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7519.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7519
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58829
published_at 2026-04-18T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.58763
published_at 2026-04-02T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.58825
published_at 2026-04-16T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.58793
published_at 2026-04-13T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58805
published_at 2026-04-08T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.58753
published_at 2026-04-07T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.58784
published_at 2026-04-04T12:55:00Z
7
value 0.00369
scoring_system epss
scoring_elements 0.5883
published_at 2026-04-11T12:55:00Z
8
value 0.00369
scoring_system epss
scoring_elements 0.58812
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7519
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303136
reference_id 2303136
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303136
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
reference_id mfsa2024-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
25
reference_url https://www.mozilla.org/security/advisories/mfsa2024-38/
reference_id mfsa2024-38
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/
url https://www.mozilla.org/security/advisories/mfsa2024-38/
26
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
27
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
28
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
29
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
30
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
31
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
32
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
33
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
34
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
35
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
36
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
37
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
38
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
39
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
40
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
41
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
42
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
43
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1902307
reference_id show_bug.cgi?id=1902307
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1902307
44
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
45
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-7519
risk_score 4.3
exploitability 0.5
weighted_severity 8.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2pvz-3cmq-53dk
4
url VCID-3ayf-d2s1-67ff
vulnerability_id VCID-3ayf-d2s1-67ff
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8382.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8382.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8382
reference_id
reference_type
scores
0
value 0.00242
scoring_system epss
scoring_elements 0.47431
published_at 2026-04-02T12:55:00Z
1
value 0.00242
scoring_system epss
scoring_elements 0.47517
published_at 2026-04-16T12:55:00Z
2
value 0.00242
scoring_system epss
scoring_elements 0.47457
published_at 2026-04-13T12:55:00Z
3
value 0.00242
scoring_system epss
scoring_elements 0.47451
published_at 2026-04-12T12:55:00Z
4
value 0.00242
scoring_system epss
scoring_elements 0.47476
published_at 2026-04-11T12:55:00Z
5
value 0.00242
scoring_system epss
scoring_elements 0.47456
published_at 2026-04-08T12:55:00Z
6
value 0.00242
scoring_system epss
scoring_elements 0.47401
published_at 2026-04-07T12:55:00Z
7
value 0.00242
scoring_system epss
scoring_elements 0.47452
published_at 2026-04-09T12:55:00Z
8
value 0.00242
scoring_system epss
scoring_elements 0.47509
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8382
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8382
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2309428
reference_id 2309428
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2309428
5
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
6
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
7
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
reference_id mfsa2024-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-39/
reference_id mfsa2024-39
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/
url https://www.mozilla.org/security/advisories/mfsa2024-39/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
reference_id mfsa2024-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-40/
reference_id mfsa2024-40
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/
url https://www.mozilla.org/security/advisories/mfsa2024-40/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-41
reference_id mfsa2024-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-41
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-41/
reference_id mfsa2024-41
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/
url https://www.mozilla.org/security/advisories/mfsa2024-41/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
reference_id mfsa2024-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-43/
reference_id mfsa2024-43
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/
url https://www.mozilla.org/security/advisories/mfsa2024-43/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-44
reference_id mfsa2024-44
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-44
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-44/
reference_id mfsa2024-44
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/
url https://www.mozilla.org/security/advisories/mfsa2024-44/
18
reference_url https://access.redhat.com/errata/RHSA-2024:6681
reference_id RHSA-2024:6681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6681
19
reference_url https://access.redhat.com/errata/RHSA-2024:6682
reference_id RHSA-2024:6682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6682
20
reference_url https://access.redhat.com/errata/RHSA-2024:6683
reference_id RHSA-2024:6683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6683
21
reference_url https://access.redhat.com/errata/RHSA-2024:6684
reference_id RHSA-2024:6684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6684
22
reference_url https://access.redhat.com/errata/RHSA-2024:6719
reference_id RHSA-2024:6719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6719
23
reference_url https://access.redhat.com/errata/RHSA-2024:6720
reference_id RHSA-2024:6720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6720
24
reference_url https://access.redhat.com/errata/RHSA-2024:6721
reference_id RHSA-2024:6721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6721
25
reference_url https://access.redhat.com/errata/RHSA-2024:6722
reference_id RHSA-2024:6722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6722
26
reference_url https://access.redhat.com/errata/RHSA-2024:6723
reference_id RHSA-2024:6723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6723
27
reference_url https://access.redhat.com/errata/RHSA-2024:6782
reference_id RHSA-2024:6782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6782
28
reference_url https://access.redhat.com/errata/RHSA-2024:6786
reference_id RHSA-2024:6786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6786
29
reference_url https://access.redhat.com/errata/RHSA-2024:6816
reference_id RHSA-2024:6816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6816
30
reference_url https://access.redhat.com/errata/RHSA-2024:6838
reference_id RHSA-2024:6838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6838
31
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
32
reference_url https://access.redhat.com/errata/RHSA-2024:6850
reference_id RHSA-2024:6850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6850
33
reference_url https://access.redhat.com/errata/RHSA-2024:6891
reference_id RHSA-2024:6891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6891
34
reference_url https://access.redhat.com/errata/RHSA-2024:6892
reference_id RHSA-2024:6892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6892
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1906744
reference_id show_bug.cgi?id=1906744
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1906744
36
reference_url https://usn.ubuntu.com/6992-1/
reference_id USN-6992-1
reference_type
scores
url https://usn.ubuntu.com/6992-1/
37
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-8382
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ayf-d2s1-67ff
5
url VCID-3sjh-f264-m3g7
vulnerability_id VCID-3sjh-f264-m3g7
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8387.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8387.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8387
reference_id
reference_type
scores
0
value 0.00543
scoring_system epss
scoring_elements 0.67746
published_at 2026-04-16T12:55:00Z
1
value 0.00543
scoring_system epss
scoring_elements 0.67688
published_at 2026-04-04T12:55:00Z
2
value 0.00543
scoring_system epss
scoring_elements 0.67735
published_at 2026-04-09T12:55:00Z
3
value 0.00543
scoring_system epss
scoring_elements 0.6772
published_at 2026-04-08T12:55:00Z
4
value 0.00543
scoring_system epss
scoring_elements 0.67669
published_at 2026-04-07T12:55:00Z
5
value 0.00543
scoring_system epss
scoring_elements 0.67668
published_at 2026-04-02T12:55:00Z
6
value 0.00543
scoring_system epss
scoring_elements 0.6771
published_at 2026-04-13T12:55:00Z
7
value 0.00543
scoring_system epss
scoring_elements 0.67744
published_at 2026-04-12T12:55:00Z
8
value 0.00543
scoring_system epss
scoring_elements 0.67759
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8387
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2309433
reference_id 2309433
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2309433
4
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1857607%2C1911858%2C1914009
reference_id buglist.cgi?bug_id=1857607%2C1911858%2C1914009
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:41:12Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1857607%2C1911858%2C1914009
5
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
6
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
7
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
reference_id mfsa2024-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-39/
reference_id mfsa2024-39
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:41:12Z/
url https://www.mozilla.org/security/advisories/mfsa2024-39/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
reference_id mfsa2024-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-40/
reference_id mfsa2024-40
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:41:12Z/
url https://www.mozilla.org/security/advisories/mfsa2024-40/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
reference_id mfsa2024-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-43/
reference_id mfsa2024-43
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:41:12Z/
url https://www.mozilla.org/security/advisories/mfsa2024-43/
14
reference_url https://access.redhat.com/errata/RHSA-2024:6681
reference_id RHSA-2024:6681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6681
15
reference_url https://access.redhat.com/errata/RHSA-2024:6682
reference_id RHSA-2024:6682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6682
16
reference_url https://access.redhat.com/errata/RHSA-2024:6683
reference_id RHSA-2024:6683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6683
17
reference_url https://access.redhat.com/errata/RHSA-2024:6684
reference_id RHSA-2024:6684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6684
18
reference_url https://access.redhat.com/errata/RHSA-2024:6719
reference_id RHSA-2024:6719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6719
19
reference_url https://access.redhat.com/errata/RHSA-2024:6720
reference_id RHSA-2024:6720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6720
20
reference_url https://access.redhat.com/errata/RHSA-2024:6721
reference_id RHSA-2024:6721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6721
21
reference_url https://access.redhat.com/errata/RHSA-2024:6722
reference_id RHSA-2024:6722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6722
22
reference_url https://access.redhat.com/errata/RHSA-2024:6723
reference_id RHSA-2024:6723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6723
23
reference_url https://access.redhat.com/errata/RHSA-2024:6782
reference_id RHSA-2024:6782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6782
24
reference_url https://access.redhat.com/errata/RHSA-2024:6786
reference_id RHSA-2024:6786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6786
25
reference_url https://access.redhat.com/errata/RHSA-2024:6816
reference_id RHSA-2024:6816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6816
26
reference_url https://access.redhat.com/errata/RHSA-2024:6838
reference_id RHSA-2024:6838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6838
27
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
28
reference_url https://access.redhat.com/errata/RHSA-2024:6850
reference_id RHSA-2024:6850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6850
29
reference_url https://access.redhat.com/errata/RHSA-2024:6891
reference_id RHSA-2024:6891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6891
30
reference_url https://access.redhat.com/errata/RHSA-2024:6892
reference_id RHSA-2024:6892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6892
31
reference_url https://usn.ubuntu.com/6992-1/
reference_id USN-6992-1
reference_type
scores
url https://usn.ubuntu.com/6992-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-8387
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3sjh-f264-m3g7
6
url VCID-4jfr-pz41-gfbz
vulnerability_id VCID-4jfr-pz41-gfbz
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7523
reference_id
reference_type
scores
0
value 0.00115
scoring_system epss
scoring_elements 0.30147
published_at 2026-04-18T12:55:00Z
1
value 0.00115
scoring_system epss
scoring_elements 0.30203
published_at 2026-04-08T12:55:00Z
2
value 0.00115
scoring_system epss
scoring_elements 0.30238
published_at 2026-04-09T12:55:00Z
3
value 0.00115
scoring_system epss
scoring_elements 0.30241
published_at 2026-04-11T12:55:00Z
4
value 0.00115
scoring_system epss
scoring_elements 0.30198
published_at 2026-04-12T12:55:00Z
5
value 0.00115
scoring_system epss
scoring_elements 0.30151
published_at 2026-04-13T12:55:00Z
6
value 0.00115
scoring_system epss
scoring_elements 0.30166
published_at 2026-04-16T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30279
published_at 2026-04-02T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30329
published_at 2026-04-04T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.30143
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7523
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
3
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
4
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
6
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:41:10Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1908344
reference_id show_bug.cgi?id=1908344
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:41:10Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1908344
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-7523
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4jfr-pz41-gfbz
7
url VCID-62zr-8w1c-bydt
vulnerability_id VCID-62zr-8w1c-bydt
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8394.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8394.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8394
reference_id
reference_type
scores
0
value 0.00363
scoring_system epss
scoring_elements 0.58426
published_at 2026-04-18T12:55:00Z
1
value 0.00363
scoring_system epss
scoring_elements 0.58412
published_at 2026-04-09T12:55:00Z
2
value 0.00363
scoring_system epss
scoring_elements 0.58429
published_at 2026-04-11T12:55:00Z
3
value 0.00363
scoring_system epss
scoring_elements 0.58408
published_at 2026-04-12T12:55:00Z
4
value 0.00363
scoring_system epss
scoring_elements 0.58389
published_at 2026-04-13T12:55:00Z
5
value 0.00363
scoring_system epss
scoring_elements 0.58422
published_at 2026-04-16T12:55:00Z
6
value 0.00363
scoring_system epss
scoring_elements 0.58359
published_at 2026-04-02T12:55:00Z
7
value 0.00363
scoring_system epss
scoring_elements 0.58379
published_at 2026-04-04T12:55:00Z
8
value 0.00363
scoring_system epss
scoring_elements 0.58353
published_at 2026-04-07T12:55:00Z
9
value 0.00363
scoring_system epss
scoring_elements 0.58406
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8394
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2310481
reference_id 2310481
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2310481
3
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
4
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
5
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
reference_id mfsa2024-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
7
reference_url https://www.mozilla.org/security/advisories/mfsa2024-43/
reference_id mfsa2024-43
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-06T19:38:19Z/
url https://www.mozilla.org/security/advisories/mfsa2024-43/
8
reference_url https://access.redhat.com/errata/RHSA-2024:6683
reference_id RHSA-2024:6683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6683
9
reference_url https://access.redhat.com/errata/RHSA-2024:6684
reference_id RHSA-2024:6684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6684
10
reference_url https://access.redhat.com/errata/RHSA-2024:6719
reference_id RHSA-2024:6719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6719
11
reference_url https://access.redhat.com/errata/RHSA-2024:6720
reference_id RHSA-2024:6720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6720
12
reference_url https://access.redhat.com/errata/RHSA-2024:6721
reference_id RHSA-2024:6721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6721
13
reference_url https://access.redhat.com/errata/RHSA-2024:6722
reference_id RHSA-2024:6722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6722
14
reference_url https://access.redhat.com/errata/RHSA-2024:6723
reference_id RHSA-2024:6723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6723
15
reference_url https://access.redhat.com/errata/RHSA-2024:6816
reference_id RHSA-2024:6816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6816
16
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1895737
reference_id show_bug.cgi?id=1895737
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-06T19:38:19Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1895737
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-8394
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-62zr-8w1c-bydt
8
url VCID-6bbw-b3rx-a7hj
vulnerability_id VCID-6bbw-b3rx-a7hj
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10462.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10462.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10462
reference_id
reference_type
scores
0
value 0.00502
scoring_system epss
scoring_elements 0.66077
published_at 2026-04-18T12:55:00Z
1
value 0.00502
scoring_system epss
scoring_elements 0.66063
published_at 2026-04-16T12:55:00Z
2
value 0.00502
scoring_system epss
scoring_elements 0.66028
published_at 2026-04-13T12:55:00Z
3
value 0.00502
scoring_system epss
scoring_elements 0.66058
published_at 2026-04-12T12:55:00Z
4
value 0.00502
scoring_system epss
scoring_elements 0.66071
published_at 2026-04-11T12:55:00Z
5
value 0.00502
scoring_system epss
scoring_elements 0.66052
published_at 2026-04-09T12:55:00Z
6
value 0.00502
scoring_system epss
scoring_elements 0.6604
published_at 2026-04-08T12:55:00Z
7
value 0.00502
scoring_system epss
scoring_elements 0.65994
published_at 2026-04-02T12:55:00Z
8
value 0.00502
scoring_system epss
scoring_elements 0.6599
published_at 2026-04-07T12:55:00Z
9
value 0.00502
scoring_system epss
scoring_elements 0.66023
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10462
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10462
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322440
reference_id 2322440
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322440
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
reference_id mfsa2024-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-55/
reference_id mfsa2024-55
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T15:00:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-55/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
reference_id mfsa2024-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-56/
reference_id mfsa2024-56
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T15:00:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-56/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
reference_id mfsa2024-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-58/
reference_id mfsa2024-58
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T15:00:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-58/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
reference_id mfsa2024-59
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-59/
reference_id mfsa2024-59
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T15:00:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-59/
16
reference_url https://access.redhat.com/errata/RHSA-2024:8720
reference_id RHSA-2024:8720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8720
17
reference_url https://access.redhat.com/errata/RHSA-2024:8721
reference_id RHSA-2024:8721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8721
18
reference_url https://access.redhat.com/errata/RHSA-2024:8722
reference_id RHSA-2024:8722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8722
19
reference_url https://access.redhat.com/errata/RHSA-2024:8723
reference_id RHSA-2024:8723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8723
20
reference_url https://access.redhat.com/errata/RHSA-2024:8724
reference_id RHSA-2024:8724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8724
21
reference_url https://access.redhat.com/errata/RHSA-2024:8725
reference_id RHSA-2024:8725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8725
22
reference_url https://access.redhat.com/errata/RHSA-2024:8726
reference_id RHSA-2024:8726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8726
23
reference_url https://access.redhat.com/errata/RHSA-2024:8727
reference_id RHSA-2024:8727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8727
24
reference_url https://access.redhat.com/errata/RHSA-2024:8728
reference_id RHSA-2024:8728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8728
25
reference_url https://access.redhat.com/errata/RHSA-2024:8729
reference_id RHSA-2024:8729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8729
26
reference_url https://access.redhat.com/errata/RHSA-2024:8790
reference_id RHSA-2024:8790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8790
27
reference_url https://access.redhat.com/errata/RHSA-2024:8793
reference_id RHSA-2024:8793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8793
28
reference_url https://access.redhat.com/errata/RHSA-2024:9015
reference_id RHSA-2024:9015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9015
29
reference_url https://access.redhat.com/errata/RHSA-2024:9016
reference_id RHSA-2024:9016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9016
30
reference_url https://access.redhat.com/errata/RHSA-2024:9017
reference_id RHSA-2024:9017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9017
31
reference_url https://access.redhat.com/errata/RHSA-2024:9018
reference_id RHSA-2024:9018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9018
32
reference_url https://access.redhat.com/errata/RHSA-2024:9019
reference_id RHSA-2024:9019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9019
33
reference_url https://access.redhat.com/errata/RHSA-2024:9552
reference_id RHSA-2024:9552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9552
34
reference_url https://access.redhat.com/errata/RHSA-2024:9554
reference_id RHSA-2024:9554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9554
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1920423
reference_id show_bug.cgi?id=1920423
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T15:00:03Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1920423
36
reference_url https://usn.ubuntu.com/7086-1/
reference_id USN-7086-1
reference_type
scores
url https://usn.ubuntu.com/7086-1/
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-10462
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6bbw-b3rx-a7hj
9
url VCID-957q-jagj-9kg7
vulnerability_id VCID-957q-jagj-9kg7
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7527.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7527.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7527
reference_id
reference_type
scores
0
value 0.00239
scoring_system epss
scoring_elements 0.47055
published_at 2026-04-18T12:55:00Z
1
value 0.00239
scoring_system epss
scoring_elements 0.47059
published_at 2026-04-16T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.47003
published_at 2026-04-13T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.46981
published_at 2026-04-02T12:55:00Z
4
value 0.00239
scoring_system epss
scoring_elements 0.46998
published_at 2026-04-09T12:55:00Z
5
value 0.00239
scoring_system epss
scoring_elements 0.47001
published_at 2026-04-08T12:55:00Z
6
value 0.00239
scoring_system epss
scoring_elements 0.46947
published_at 2026-04-07T12:55:00Z
7
value 0.00239
scoring_system epss
scoring_elements 0.46999
published_at 2026-04-04T12:55:00Z
8
value 0.00239
scoring_system epss
scoring_elements 0.46996
published_at 2026-04-12T12:55:00Z
9
value 0.00239
scoring_system epss
scoring_elements 0.47023
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7527
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303144
reference_id 2303144
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303144
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
reference_id mfsa2024-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
25
reference_url https://www.mozilla.org/security/advisories/mfsa2024-38/
reference_id mfsa2024-38
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/
url https://www.mozilla.org/security/advisories/mfsa2024-38/
26
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
27
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
28
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
29
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
30
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
31
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
32
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
33
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
34
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
35
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
36
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
37
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
38
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
39
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
40
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
41
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
42
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
43
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1871303
reference_id show_bug.cgi?id=1871303
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1871303
44
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
45
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-7527
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-957q-jagj-9kg7
10
url VCID-9caj-c15z-xuf5
vulnerability_id VCID-9caj-c15z-xuf5
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9403.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9403.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9403
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.28247
published_at 2026-04-18T12:55:00Z
1
value 0.00103
scoring_system epss
scoring_elements 0.28408
published_at 2026-04-02T12:55:00Z
2
value 0.00103
scoring_system epss
scoring_elements 0.2845
published_at 2026-04-04T12:55:00Z
3
value 0.00103
scoring_system epss
scoring_elements 0.28242
published_at 2026-04-07T12:55:00Z
4
value 0.00103
scoring_system epss
scoring_elements 0.28308
published_at 2026-04-08T12:55:00Z
5
value 0.00103
scoring_system epss
scoring_elements 0.28351
published_at 2026-04-09T12:55:00Z
6
value 0.00103
scoring_system epss
scoring_elements 0.28355
published_at 2026-04-11T12:55:00Z
7
value 0.00103
scoring_system epss
scoring_elements 0.28312
published_at 2026-04-12T12:55:00Z
8
value 0.00103
scoring_system epss
scoring_elements 0.28254
published_at 2026-04-13T12:55:00Z
9
value 0.00103
scoring_system epss
scoring_elements 0.28266
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9403
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315947
reference_id 2315947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315947
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:34:25Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:34:25Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
11
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
12
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
13
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
14
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
15
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
16
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
17
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
18
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
19
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
20
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
21
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
22
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
23
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
24
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
25
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
26
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1917807
reference_id show_bug.cgi?id=1917807
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:34:25Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1917807
27
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
28
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-9403
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9caj-c15z-xuf5
11
url VCID-aemu-emvp-hkfh
vulnerability_id VCID-aemu-emvp-hkfh
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10460.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10460.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10460
reference_id
reference_type
scores
0
value 0.00419
scoring_system epss
scoring_elements 0.61936
published_at 2026-04-18T12:55:00Z
1
value 0.00419
scoring_system epss
scoring_elements 0.61931
published_at 2026-04-16T12:55:00Z
2
value 0.00419
scoring_system epss
scoring_elements 0.61888
published_at 2026-04-13T12:55:00Z
3
value 0.00419
scoring_system epss
scoring_elements 0.61832
published_at 2026-04-02T12:55:00Z
4
value 0.00419
scoring_system epss
scoring_elements 0.61883
published_at 2026-04-08T12:55:00Z
5
value 0.00419
scoring_system epss
scoring_elements 0.61834
published_at 2026-04-07T12:55:00Z
6
value 0.00419
scoring_system epss
scoring_elements 0.61862
published_at 2026-04-04T12:55:00Z
7
value 0.00419
scoring_system epss
scoring_elements 0.61908
published_at 2026-04-12T12:55:00Z
8
value 0.00419
scoring_system epss
scoring_elements 0.6192
published_at 2026-04-11T12:55:00Z
9
value 0.00419
scoring_system epss
scoring_elements 0.61899
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10460
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10460
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322444
reference_id 2322444
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322444
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
reference_id mfsa2024-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-55/
reference_id mfsa2024-55
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:40:17Z/
url https://www.mozilla.org/security/advisories/mfsa2024-55/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
reference_id mfsa2024-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-56/
reference_id mfsa2024-56
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:40:17Z/
url https://www.mozilla.org/security/advisories/mfsa2024-56/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
reference_id mfsa2024-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-58/
reference_id mfsa2024-58
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:40:17Z/
url https://www.mozilla.org/security/advisories/mfsa2024-58/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
reference_id mfsa2024-59
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-59/
reference_id mfsa2024-59
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:40:17Z/
url https://www.mozilla.org/security/advisories/mfsa2024-59/
16
reference_url https://access.redhat.com/errata/RHSA-2024:8720
reference_id RHSA-2024:8720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8720
17
reference_url https://access.redhat.com/errata/RHSA-2024:8721
reference_id RHSA-2024:8721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8721
18
reference_url https://access.redhat.com/errata/RHSA-2024:8722
reference_id RHSA-2024:8722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8722
19
reference_url https://access.redhat.com/errata/RHSA-2024:8723
reference_id RHSA-2024:8723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8723
20
reference_url https://access.redhat.com/errata/RHSA-2024:8724
reference_id RHSA-2024:8724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8724
21
reference_url https://access.redhat.com/errata/RHSA-2024:8725
reference_id RHSA-2024:8725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8725
22
reference_url https://access.redhat.com/errata/RHSA-2024:8726
reference_id RHSA-2024:8726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8726
23
reference_url https://access.redhat.com/errata/RHSA-2024:8727
reference_id RHSA-2024:8727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8727
24
reference_url https://access.redhat.com/errata/RHSA-2024:8728
reference_id RHSA-2024:8728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8728
25
reference_url https://access.redhat.com/errata/RHSA-2024:8729
reference_id RHSA-2024:8729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8729
26
reference_url https://access.redhat.com/errata/RHSA-2024:8790
reference_id RHSA-2024:8790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8790
27
reference_url https://access.redhat.com/errata/RHSA-2024:8793
reference_id RHSA-2024:8793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8793
28
reference_url https://access.redhat.com/errata/RHSA-2024:9015
reference_id RHSA-2024:9015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9015
29
reference_url https://access.redhat.com/errata/RHSA-2024:9016
reference_id RHSA-2024:9016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9016
30
reference_url https://access.redhat.com/errata/RHSA-2024:9017
reference_id RHSA-2024:9017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9017
31
reference_url https://access.redhat.com/errata/RHSA-2024:9018
reference_id RHSA-2024:9018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9018
32
reference_url https://access.redhat.com/errata/RHSA-2024:9019
reference_id RHSA-2024:9019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9019
33
reference_url https://access.redhat.com/errata/RHSA-2024:9552
reference_id RHSA-2024:9552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9552
34
reference_url https://access.redhat.com/errata/RHSA-2024:9554
reference_id RHSA-2024:9554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9554
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1912537
reference_id show_bug.cgi?id=1912537
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:40:17Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1912537
36
reference_url https://usn.ubuntu.com/7086-1/
reference_id USN-7086-1
reference_type
scores
url https://usn.ubuntu.com/7086-1/
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-10460
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aemu-emvp-hkfh
12
url VCID-b6ug-rdyx-4uaw
vulnerability_id VCID-b6ug-rdyx-4uaw
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8900.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8900.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8900
reference_id
reference_type
scores
0
value 0.00216
scoring_system epss
scoring_elements 0.44151
published_at 2026-04-04T12:55:00Z
1
value 0.00216
scoring_system epss
scoring_elements 0.44136
published_at 2026-04-09T12:55:00Z
2
value 0.00216
scoring_system epss
scoring_elements 0.44133
published_at 2026-04-08T12:55:00Z
3
value 0.00216
scoring_system epss
scoring_elements 0.44128
published_at 2026-04-02T12:55:00Z
4
value 0.00216
scoring_system epss
scoring_elements 0.44082
published_at 2026-04-07T12:55:00Z
5
value 0.00216
scoring_system epss
scoring_elements 0.44171
published_at 2026-04-18T12:55:00Z
6
value 0.00216
scoring_system epss
scoring_elements 0.44181
published_at 2026-04-16T12:55:00Z
7
value 0.00216
scoring_system epss
scoring_elements 0.44119
published_at 2026-04-13T12:55:00Z
8
value 0.00216
scoring_system epss
scoring_elements 0.44152
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8900
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2312914
reference_id 2312914
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2312914
3
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
4
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
5
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
7
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-18T20:14:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-18T20:14:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-18T20:14:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
12
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
13
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
14
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
15
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
16
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
17
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
18
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
19
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
20
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1872841
reference_id show_bug.cgi?id=1872841
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-18T20:14:27Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1872841
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-8900
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b6ug-rdyx-4uaw
13
url VCID-b9aw-u5wp-6uhk
vulnerability_id VCID-b9aw-u5wp-6uhk
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5693.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5693.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-5693
reference_id
reference_type
scores
0
value 0.0147
scoring_system epss
scoring_elements 0.80919
published_at 2026-04-08T12:55:00Z
1
value 0.0147
scoring_system epss
scoring_elements 0.80956
published_at 2026-04-16T12:55:00Z
2
value 0.0147
scoring_system epss
scoring_elements 0.80921
published_at 2026-04-13T12:55:00Z
3
value 0.0147
scoring_system epss
scoring_elements 0.8093
published_at 2026-04-12T12:55:00Z
4
value 0.0147
scoring_system epss
scoring_elements 0.80944
published_at 2026-04-11T12:55:00Z
5
value 0.0147
scoring_system epss
scoring_elements 0.80928
published_at 2026-04-09T12:55:00Z
6
value 0.0147
scoring_system epss
scoring_elements 0.80871
published_at 2026-04-02T12:55:00Z
7
value 0.0147
scoring_system epss
scoring_elements 0.80894
published_at 2026-04-04T12:55:00Z
8
value 0.0147
scoring_system epss
scoring_elements 0.80891
published_at 2026-04-07T12:55:00Z
9
value 0.0147
scoring_system epss
scoring_elements 0.80958
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-5693
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2291399
reference_id 2291399
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2291399
10
reference_url https://security.gentoo.org/glsa/202408-02
reference_id GLSA-202408-02
reference_type
scores
url https://security.gentoo.org/glsa/202408-02
11
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
12
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-25
reference_id mfsa2024-25
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-25
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-25/
reference_id mfsa2024-25
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/
url https://www.mozilla.org/security/advisories/mfsa2024-25/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-26
reference_id mfsa2024-26
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-26
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-26/
reference_id mfsa2024-26
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/
url https://www.mozilla.org/security/advisories/mfsa2024-26/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-28
reference_id mfsa2024-28
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-28
18
reference_url https://www.mozilla.org/security/advisories/mfsa2024-28/
reference_id mfsa2024-28
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/
url https://www.mozilla.org/security/advisories/mfsa2024-28/
19
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html
20
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html
21
reference_url https://access.redhat.com/errata/RHSA-2024:3949
reference_id RHSA-2024:3949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3949
22
reference_url https://access.redhat.com/errata/RHSA-2024:3950
reference_id RHSA-2024:3950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3950
23
reference_url https://access.redhat.com/errata/RHSA-2024:3951
reference_id RHSA-2024:3951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3951
24
reference_url https://access.redhat.com/errata/RHSA-2024:3952
reference_id RHSA-2024:3952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3952
25
reference_url https://access.redhat.com/errata/RHSA-2024:3953
reference_id RHSA-2024:3953
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3953
26
reference_url https://access.redhat.com/errata/RHSA-2024:3954
reference_id RHSA-2024:3954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3954
27
reference_url https://access.redhat.com/errata/RHSA-2024:3955
reference_id RHSA-2024:3955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3955
28
reference_url https://access.redhat.com/errata/RHSA-2024:3958
reference_id RHSA-2024:3958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3958
29
reference_url https://access.redhat.com/errata/RHSA-2024:3972
reference_id RHSA-2024:3972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3972
30
reference_url https://access.redhat.com/errata/RHSA-2024:4001
reference_id RHSA-2024:4001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4001
31
reference_url https://access.redhat.com/errata/RHSA-2024:4002
reference_id RHSA-2024:4002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4002
32
reference_url https://access.redhat.com/errata/RHSA-2024:4003
reference_id RHSA-2024:4003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4003
33
reference_url https://access.redhat.com/errata/RHSA-2024:4004
reference_id RHSA-2024:4004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4004
34
reference_url https://access.redhat.com/errata/RHSA-2024:4015
reference_id RHSA-2024:4015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4015
35
reference_url https://access.redhat.com/errata/RHSA-2024:4016
reference_id RHSA-2024:4016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4016
36
reference_url https://access.redhat.com/errata/RHSA-2024:4018
reference_id RHSA-2024:4018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4018
37
reference_url https://access.redhat.com/errata/RHSA-2024:4036
reference_id RHSA-2024:4036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4036
38
reference_url https://access.redhat.com/errata/RHSA-2024:4063
reference_id RHSA-2024:4063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4063
39
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1891319
reference_id show_bug.cgi?id=1891319
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1891319
40
reference_url https://usn.ubuntu.com/6840-1/
reference_id USN-6840-1
reference_type
scores
url https://usn.ubuntu.com/6840-1/
41
reference_url https://usn.ubuntu.com/6862-1/
reference_id USN-6862-1
reference_type
scores
url https://usn.ubuntu.com/6862-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-5693
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b9aw-u5wp-6uhk
14
url VCID-bshu-jxhj-27b8
vulnerability_id VCID-bshu-jxhj-27b8
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5700.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5700.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-5700
reference_id
reference_type
scores
0
value 0.0017
scoring_system epss
scoring_elements 0.38207
published_at 2026-04-08T12:55:00Z
1
value 0.0017
scoring_system epss
scoring_elements 0.3822
published_at 2026-04-16T12:55:00Z
2
value 0.0017
scoring_system epss
scoring_elements 0.38175
published_at 2026-04-13T12:55:00Z
3
value 0.0017
scoring_system epss
scoring_elements 0.38199
published_at 2026-04-12T12:55:00Z
4
value 0.0017
scoring_system epss
scoring_elements 0.38234
published_at 2026-04-11T12:55:00Z
5
value 0.0017
scoring_system epss
scoring_elements 0.38215
published_at 2026-04-09T12:55:00Z
6
value 0.0017
scoring_system epss
scoring_elements 0.38265
published_at 2026-04-02T12:55:00Z
7
value 0.0017
scoring_system epss
scoring_elements 0.38288
published_at 2026-04-04T12:55:00Z
8
value 0.0017
scoring_system epss
scoring_elements 0.38156
published_at 2026-04-07T12:55:00Z
9
value 0.0017
scoring_system epss
scoring_elements 0.38201
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-5700
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2291401
reference_id 2291401
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2291401
10
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1862809%2C1889355%2C1893388%2C1895123
reference_id buglist.cgi?bug_id=1862809%2C1889355%2C1893388%2C1895123
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1862809%2C1889355%2C1893388%2C1895123
11
reference_url https://security.gentoo.org/glsa/202408-02
reference_id GLSA-202408-02
reference_type
scores
url https://security.gentoo.org/glsa/202408-02
12
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
13
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-25
reference_id mfsa2024-25
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-25
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-25/
reference_id mfsa2024-25
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/
url https://www.mozilla.org/security/advisories/mfsa2024-25/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-26
reference_id mfsa2024-26
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-26
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-26/
reference_id mfsa2024-26
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/
url https://www.mozilla.org/security/advisories/mfsa2024-26/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-28
reference_id mfsa2024-28
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-28
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-28/
reference_id mfsa2024-28
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/
url https://www.mozilla.org/security/advisories/mfsa2024-28/
20
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html
21
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html
22
reference_url https://access.redhat.com/errata/RHSA-2024:3949
reference_id RHSA-2024:3949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3949
23
reference_url https://access.redhat.com/errata/RHSA-2024:3950
reference_id RHSA-2024:3950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3950
24
reference_url https://access.redhat.com/errata/RHSA-2024:3951
reference_id RHSA-2024:3951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3951
25
reference_url https://access.redhat.com/errata/RHSA-2024:3952
reference_id RHSA-2024:3952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3952
26
reference_url https://access.redhat.com/errata/RHSA-2024:3953
reference_id RHSA-2024:3953
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3953
27
reference_url https://access.redhat.com/errata/RHSA-2024:3954
reference_id RHSA-2024:3954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3954
28
reference_url https://access.redhat.com/errata/RHSA-2024:3955
reference_id RHSA-2024:3955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3955
29
reference_url https://access.redhat.com/errata/RHSA-2024:3958
reference_id RHSA-2024:3958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3958
30
reference_url https://access.redhat.com/errata/RHSA-2024:3972
reference_id RHSA-2024:3972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3972
31
reference_url https://access.redhat.com/errata/RHSA-2024:4001
reference_id RHSA-2024:4001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4001
32
reference_url https://access.redhat.com/errata/RHSA-2024:4002
reference_id RHSA-2024:4002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4002
33
reference_url https://access.redhat.com/errata/RHSA-2024:4003
reference_id RHSA-2024:4003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4003
34
reference_url https://access.redhat.com/errata/RHSA-2024:4004
reference_id RHSA-2024:4004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4004
35
reference_url https://access.redhat.com/errata/RHSA-2024:4015
reference_id RHSA-2024:4015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4015
36
reference_url https://access.redhat.com/errata/RHSA-2024:4016
reference_id RHSA-2024:4016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4016
37
reference_url https://access.redhat.com/errata/RHSA-2024:4018
reference_id RHSA-2024:4018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4018
38
reference_url https://access.redhat.com/errata/RHSA-2024:4036
reference_id RHSA-2024:4036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4036
39
reference_url https://access.redhat.com/errata/RHSA-2024:4063
reference_id RHSA-2024:4063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4063
40
reference_url https://usn.ubuntu.com/6840-1/
reference_id USN-6840-1
reference_type
scores
url https://usn.ubuntu.com/6840-1/
41
reference_url https://usn.ubuntu.com/6862-1/
reference_id USN-6862-1
reference_type
scores
url https://usn.ubuntu.com/6862-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-5700
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bshu-jxhj-27b8
15
url VCID-bsnh-1chq-z7ae
vulnerability_id VCID-bsnh-1chq-z7ae
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9400.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9400.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9400
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33846
published_at 2026-04-16T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33808
published_at 2026-04-13T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33832
published_at 2026-04-18T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33874
published_at 2026-04-11T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33876
published_at 2026-04-09T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33844
published_at 2026-04-08T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33802
published_at 2026-04-07T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33917
published_at 2026-04-02T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33949
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9400
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315953
reference_id 2315953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315953
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:42:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:42:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:42:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:42:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
15
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
16
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
17
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
18
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
19
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
20
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
21
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
22
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
23
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
24
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
25
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
26
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
27
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
28
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
29
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
30
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
31
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1915249
reference_id show_bug.cgi?id=1915249
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:42:31Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1915249
32
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
33
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-9400
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bsnh-1chq-z7ae
16
url VCID-bwk4-hqx8-97dy
vulnerability_id VCID-bwk4-hqx8-97dy
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10459.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10459.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10459
reference_id
reference_type
scores
0
value 0.0071
scoring_system epss
scoring_elements 0.72289
published_at 2026-04-18T12:55:00Z
1
value 0.0071
scoring_system epss
scoring_elements 0.7228
published_at 2026-04-16T12:55:00Z
2
value 0.0071
scoring_system epss
scoring_elements 0.72237
published_at 2026-04-13T12:55:00Z
3
value 0.0071
scoring_system epss
scoring_elements 0.72251
published_at 2026-04-12T12:55:00Z
4
value 0.0071
scoring_system epss
scoring_elements 0.7222
published_at 2026-04-04T12:55:00Z
5
value 0.0071
scoring_system epss
scoring_elements 0.72195
published_at 2026-04-07T12:55:00Z
6
value 0.0071
scoring_system epss
scoring_elements 0.722
published_at 2026-04-02T12:55:00Z
7
value 0.0071
scoring_system epss
scoring_elements 0.72267
published_at 2026-04-11T12:55:00Z
8
value 0.0071
scoring_system epss
scoring_elements 0.72244
published_at 2026-04-09T12:55:00Z
9
value 0.0071
scoring_system epss
scoring_elements 0.72232
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10459
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10459
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10459
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322429
reference_id 2322429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322429
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
reference_id mfsa2024-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-55/
reference_id mfsa2024-55
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/
url https://www.mozilla.org/security/advisories/mfsa2024-55/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
reference_id mfsa2024-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-56/
reference_id mfsa2024-56
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/
url https://www.mozilla.org/security/advisories/mfsa2024-56/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-57
reference_id mfsa2024-57
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-57
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-57/
reference_id mfsa2024-57
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/
url https://www.mozilla.org/security/advisories/mfsa2024-57/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
reference_id mfsa2024-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-58/
reference_id mfsa2024-58
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/
url https://www.mozilla.org/security/advisories/mfsa2024-58/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
reference_id mfsa2024-59
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-59/
reference_id mfsa2024-59
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/
url https://www.mozilla.org/security/advisories/mfsa2024-59/
18
reference_url https://access.redhat.com/errata/RHSA-2024:8720
reference_id RHSA-2024:8720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8720
19
reference_url https://access.redhat.com/errata/RHSA-2024:8721
reference_id RHSA-2024:8721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8721
20
reference_url https://access.redhat.com/errata/RHSA-2024:8722
reference_id RHSA-2024:8722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8722
21
reference_url https://access.redhat.com/errata/RHSA-2024:8723
reference_id RHSA-2024:8723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8723
22
reference_url https://access.redhat.com/errata/RHSA-2024:8724
reference_id RHSA-2024:8724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8724
23
reference_url https://access.redhat.com/errata/RHSA-2024:8725
reference_id RHSA-2024:8725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8725
24
reference_url https://access.redhat.com/errata/RHSA-2024:8726
reference_id RHSA-2024:8726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8726
25
reference_url https://access.redhat.com/errata/RHSA-2024:8727
reference_id RHSA-2024:8727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8727
26
reference_url https://access.redhat.com/errata/RHSA-2024:8728
reference_id RHSA-2024:8728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8728
27
reference_url https://access.redhat.com/errata/RHSA-2024:8729
reference_id RHSA-2024:8729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8729
28
reference_url https://access.redhat.com/errata/RHSA-2024:8790
reference_id RHSA-2024:8790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8790
29
reference_url https://access.redhat.com/errata/RHSA-2024:8793
reference_id RHSA-2024:8793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8793
30
reference_url https://access.redhat.com/errata/RHSA-2024:9015
reference_id RHSA-2024:9015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9015
31
reference_url https://access.redhat.com/errata/RHSA-2024:9016
reference_id RHSA-2024:9016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9016
32
reference_url https://access.redhat.com/errata/RHSA-2024:9017
reference_id RHSA-2024:9017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9017
33
reference_url https://access.redhat.com/errata/RHSA-2024:9018
reference_id RHSA-2024:9018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9018
34
reference_url https://access.redhat.com/errata/RHSA-2024:9019
reference_id RHSA-2024:9019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9019
35
reference_url https://access.redhat.com/errata/RHSA-2024:9552
reference_id RHSA-2024:9552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9552
36
reference_url https://access.redhat.com/errata/RHSA-2024:9554
reference_id RHSA-2024:9554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9554
37
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1919087
reference_id show_bug.cgi?id=1919087
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:42:29Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1919087
38
reference_url https://usn.ubuntu.com/7086-1/
reference_id USN-7086-1
reference_type
scores
url https://usn.ubuntu.com/7086-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-10459
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bwk4-hqx8-97dy
17
url VCID-cmr4-6stm-jfe9
vulnerability_id VCID-cmr4-6stm-jfe9
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7524.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7524.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7524
reference_id
reference_type
scores
0
value 0.00297
scoring_system epss
scoring_elements 0.53093
published_at 2026-04-18T12:55:00Z
1
value 0.00297
scoring_system epss
scoring_elements 0.5302
published_at 2026-04-04T12:55:00Z
2
value 0.00297
scoring_system epss
scoring_elements 0.53032
published_at 2026-04-09T12:55:00Z
3
value 0.00297
scoring_system epss
scoring_elements 0.53038
published_at 2026-04-08T12:55:00Z
4
value 0.00297
scoring_system epss
scoring_elements 0.52996
published_at 2026-04-02T12:55:00Z
5
value 0.00297
scoring_system epss
scoring_elements 0.52987
published_at 2026-04-07T12:55:00Z
6
value 0.00297
scoring_system epss
scoring_elements 0.53086
published_at 2026-04-16T12:55:00Z
7
value 0.00297
scoring_system epss
scoring_elements 0.53049
published_at 2026-04-13T12:55:00Z
8
value 0.00297
scoring_system epss
scoring_elements 0.53066
published_at 2026-04-12T12:55:00Z
9
value 0.00297
scoring_system epss
scoring_elements 0.53081
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7524
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303141
reference_id 2303141
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303141
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T20:09:21Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T20:09:21Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T20:09:21Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
23
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
24
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
25
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
26
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
27
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
28
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
29
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
30
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
31
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1909241
reference_id show_bug.cgi?id=1909241
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T20:09:21Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1909241
32
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-7524
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cmr4-6stm-jfe9
18
url VCID-dmnj-pt27-3bge
vulnerability_id VCID-dmnj-pt27-3bge
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9391.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9391.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9391
reference_id
reference_type
scores
0
value 0.00357
scoring_system epss
scoring_elements 0.58007
published_at 2026-04-18T12:55:00Z
1
value 0.00357
scoring_system epss
scoring_elements 0.58003
published_at 2026-04-08T12:55:00Z
2
value 0.00357
scoring_system epss
scoring_elements 0.58005
published_at 2026-04-09T12:55:00Z
3
value 0.00357
scoring_system epss
scoring_elements 0.58021
published_at 2026-04-11T12:55:00Z
4
value 0.00357
scoring_system epss
scoring_elements 0.57999
published_at 2026-04-12T12:55:00Z
5
value 0.00357
scoring_system epss
scoring_elements 0.57978
published_at 2026-04-13T12:55:00Z
6
value 0.00357
scoring_system epss
scoring_elements 0.58009
published_at 2026-04-16T12:55:00Z
7
value 0.00357
scoring_system epss
scoring_elements 0.57953
published_at 2026-04-02T12:55:00Z
8
value 0.00357
scoring_system epss
scoring_elements 0.57972
published_at 2026-04-04T12:55:00Z
9
value 0.00357
scoring_system epss
scoring_elements 0.57948
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9391
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315948
reference_id 2315948
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315948
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:56:22Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1892407
reference_id show_bug.cgi?id=1892407
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:56:22Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1892407
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-9391
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dmnj-pt27-3bge
19
url VCID-drjc-gxrt-q7ha
vulnerability_id VCID-drjc-gxrt-q7ha
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7520.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7520.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7520
reference_id
reference_type
scores
0
value 0.00655
scoring_system epss
scoring_elements 0.70986
published_at 2026-04-18T12:55:00Z
1
value 0.00655
scoring_system epss
scoring_elements 0.70978
published_at 2026-04-16T12:55:00Z
2
value 0.00655
scoring_system epss
scoring_elements 0.70932
published_at 2026-04-13T12:55:00Z
3
value 0.00655
scoring_system epss
scoring_elements 0.70948
published_at 2026-04-12T12:55:00Z
4
value 0.00655
scoring_system epss
scoring_elements 0.70964
published_at 2026-04-11T12:55:00Z
5
value 0.00655
scoring_system epss
scoring_elements 0.70907
published_at 2026-04-04T12:55:00Z
6
value 0.00655
scoring_system epss
scoring_elements 0.70926
published_at 2026-04-08T12:55:00Z
7
value 0.00655
scoring_system epss
scoring_elements 0.70882
published_at 2026-04-07T12:55:00Z
8
value 0.00655
scoring_system epss
scoring_elements 0.70889
published_at 2026-04-02T12:55:00Z
9
value 0.00655
scoring_system epss
scoring_elements 0.70941
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7520
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303137
reference_id 2303137
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303137
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:23:43Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:23:43Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:23:43Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
13
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
14
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
15
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
16
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
17
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
18
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
19
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
20
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
21
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
22
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
23
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
24
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
25
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
26
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
27
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
28
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
29
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
30
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1903041
reference_id show_bug.cgi?id=1903041
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:23:43Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1903041
31
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-7520
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-drjc-gxrt-q7ha
20
url VCID-ds2y-kn7q-vuct
vulnerability_id VCID-ds2y-kn7q-vuct
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10464.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10464.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10464
reference_id
reference_type
scores
0
value 0.00523
scoring_system epss
scoring_elements 0.66963
published_at 2026-04-18T12:55:00Z
1
value 0.00523
scoring_system epss
scoring_elements 0.66949
published_at 2026-04-16T12:55:00Z
2
value 0.00523
scoring_system epss
scoring_elements 0.66916
published_at 2026-04-13T12:55:00Z
3
value 0.00523
scoring_system epss
scoring_elements 0.66947
published_at 2026-04-12T12:55:00Z
4
value 0.00523
scoring_system epss
scoring_elements 0.66961
published_at 2026-04-11T12:55:00Z
5
value 0.00523
scoring_system epss
scoring_elements 0.66941
published_at 2026-04-09T12:55:00Z
6
value 0.00523
scoring_system epss
scoring_elements 0.66927
published_at 2026-04-08T12:55:00Z
7
value 0.00523
scoring_system epss
scoring_elements 0.6688
published_at 2026-04-02T12:55:00Z
8
value 0.00523
scoring_system epss
scoring_elements 0.66879
published_at 2026-04-07T12:55:00Z
9
value 0.00523
scoring_system epss
scoring_elements 0.66906
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10464
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10464
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322424
reference_id 2322424
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322424
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
reference_id mfsa2024-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-55/
reference_id mfsa2024-55
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:48:10Z/
url https://www.mozilla.org/security/advisories/mfsa2024-55/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
reference_id mfsa2024-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-56/
reference_id mfsa2024-56
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:48:10Z/
url https://www.mozilla.org/security/advisories/mfsa2024-56/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
reference_id mfsa2024-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-58/
reference_id mfsa2024-58
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:48:10Z/
url https://www.mozilla.org/security/advisories/mfsa2024-58/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
reference_id mfsa2024-59
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-59/
reference_id mfsa2024-59
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:48:10Z/
url https://www.mozilla.org/security/advisories/mfsa2024-59/
16
reference_url https://access.redhat.com/errata/RHSA-2024:8720
reference_id RHSA-2024:8720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8720
17
reference_url https://access.redhat.com/errata/RHSA-2024:8721
reference_id RHSA-2024:8721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8721
18
reference_url https://access.redhat.com/errata/RHSA-2024:8722
reference_id RHSA-2024:8722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8722
19
reference_url https://access.redhat.com/errata/RHSA-2024:8723
reference_id RHSA-2024:8723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8723
20
reference_url https://access.redhat.com/errata/RHSA-2024:8724
reference_id RHSA-2024:8724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8724
21
reference_url https://access.redhat.com/errata/RHSA-2024:8725
reference_id RHSA-2024:8725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8725
22
reference_url https://access.redhat.com/errata/RHSA-2024:8726
reference_id RHSA-2024:8726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8726
23
reference_url https://access.redhat.com/errata/RHSA-2024:8727
reference_id RHSA-2024:8727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8727
24
reference_url https://access.redhat.com/errata/RHSA-2024:8728
reference_id RHSA-2024:8728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8728
25
reference_url https://access.redhat.com/errata/RHSA-2024:8729
reference_id RHSA-2024:8729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8729
26
reference_url https://access.redhat.com/errata/RHSA-2024:8790
reference_id RHSA-2024:8790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8790
27
reference_url https://access.redhat.com/errata/RHSA-2024:8793
reference_id RHSA-2024:8793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8793
28
reference_url https://access.redhat.com/errata/RHSA-2024:9015
reference_id RHSA-2024:9015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9015
29
reference_url https://access.redhat.com/errata/RHSA-2024:9016
reference_id RHSA-2024:9016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9016
30
reference_url https://access.redhat.com/errata/RHSA-2024:9017
reference_id RHSA-2024:9017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9017
31
reference_url https://access.redhat.com/errata/RHSA-2024:9018
reference_id RHSA-2024:9018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9018
32
reference_url https://access.redhat.com/errata/RHSA-2024:9019
reference_id RHSA-2024:9019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9019
33
reference_url https://access.redhat.com/errata/RHSA-2024:9552
reference_id RHSA-2024:9552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9552
34
reference_url https://access.redhat.com/errata/RHSA-2024:9554
reference_id RHSA-2024:9554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9554
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1913000
reference_id show_bug.cgi?id=1913000
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:48:10Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1913000
36
reference_url https://usn.ubuntu.com/7086-1/
reference_id USN-7086-1
reference_type
scores
url https://usn.ubuntu.com/7086-1/
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-10464
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ds2y-kn7q-vuct
21
url VCID-frvc-mqhd-eydh
vulnerability_id VCID-frvc-mqhd-eydh
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6601.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6601.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6601
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29647
published_at 2026-04-18T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29669
published_at 2026-04-16T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29784
published_at 2026-04-02T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29745
published_at 2026-04-09T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29708
published_at 2026-04-08T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29646
published_at 2026-04-07T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.2983
published_at 2026-04-04T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29651
published_at 2026-04-13T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29703
published_at 2026-04-12T12:55:00Z
9
value 0.00112
scoring_system epss
scoring_elements 0.29747
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6601
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2296636
reference_id 2296636
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2296636
9
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
10
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
11
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
reference_id mfsa2024-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-29/
reference_id mfsa2024-29
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:21:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-29/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-30
reference_id mfsa2024-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-30
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-30/
reference_id mfsa2024-30
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:21:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-30/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-31
reference_id mfsa2024-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-31
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-31/
reference_id mfsa2024-31
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:21:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-31/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
reference_id mfsa2024-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-32/
reference_id mfsa2024-32
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:21:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-32/
20
reference_url https://access.redhat.com/errata/RHSA-2024:4500
reference_id RHSA-2024:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4500
21
reference_url https://access.redhat.com/errata/RHSA-2024:4501
reference_id RHSA-2024:4501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4501
22
reference_url https://access.redhat.com/errata/RHSA-2024:4508
reference_id RHSA-2024:4508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4508
23
reference_url https://access.redhat.com/errata/RHSA-2024:4517
reference_id RHSA-2024:4517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4517
24
reference_url https://access.redhat.com/errata/RHSA-2024:4586
reference_id RHSA-2024:4586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4586
25
reference_url https://access.redhat.com/errata/RHSA-2024:4590
reference_id RHSA-2024:4590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4590
26
reference_url https://access.redhat.com/errata/RHSA-2024:4610
reference_id RHSA-2024:4610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4610
27
reference_url https://access.redhat.com/errata/RHSA-2024:4624
reference_id RHSA-2024:4624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4624
28
reference_url https://access.redhat.com/errata/RHSA-2024:4625
reference_id RHSA-2024:4625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4625
29
reference_url https://access.redhat.com/errata/RHSA-2024:4634
reference_id RHSA-2024:4634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4634
30
reference_url https://access.redhat.com/errata/RHSA-2024:4635
reference_id RHSA-2024:4635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4635
31
reference_url https://access.redhat.com/errata/RHSA-2024:4670
reference_id RHSA-2024:4670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4670
32
reference_url https://access.redhat.com/errata/RHSA-2024:4671
reference_id RHSA-2024:4671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4671
33
reference_url https://access.redhat.com/errata/RHSA-2024:4673
reference_id RHSA-2024:4673
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4673
34
reference_url https://access.redhat.com/errata/RHSA-2024:4717
reference_id RHSA-2024:4717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4717
35
reference_url https://access.redhat.com/errata/RHSA-2024:4718
reference_id RHSA-2024:4718
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4718
36
reference_url https://access.redhat.com/errata/RHSA-2024:4894
reference_id RHSA-2024:4894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4894
37
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1890748
reference_id show_bug.cgi?id=1890748
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:21:13Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1890748
38
reference_url https://usn.ubuntu.com/6890-1/
reference_id USN-6890-1
reference_type
scores
url https://usn.ubuntu.com/6890-1/
39
reference_url https://usn.ubuntu.com/6903-1/
reference_id USN-6903-1
reference_type
scores
url https://usn.ubuntu.com/6903-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-6601
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-frvc-mqhd-eydh
22
url VCID-gpjz-649k-f3he
vulnerability_id VCID-gpjz-649k-f3he
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5696.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5696.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-5696
reference_id
reference_type
scores
0
value 0.02069
scoring_system epss
scoring_elements 0.83907
published_at 2026-04-07T12:55:00Z
1
value 0.02069
scoring_system epss
scoring_elements 0.83967
published_at 2026-04-18T12:55:00Z
2
value 0.02069
scoring_system epss
scoring_elements 0.83943
published_at 2026-04-13T12:55:00Z
3
value 0.02069
scoring_system epss
scoring_elements 0.83947
published_at 2026-04-12T12:55:00Z
4
value 0.02069
scoring_system epss
scoring_elements 0.83953
published_at 2026-04-11T12:55:00Z
5
value 0.02069
scoring_system epss
scoring_elements 0.83937
published_at 2026-04-09T12:55:00Z
6
value 0.02069
scoring_system epss
scoring_elements 0.8393
published_at 2026-04-08T12:55:00Z
7
value 0.02069
scoring_system epss
scoring_elements 0.83888
published_at 2026-04-02T12:55:00Z
8
value 0.02069
scoring_system epss
scoring_elements 0.83904
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-5696
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2291400
reference_id 2291400
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2291400
10
reference_url https://security.gentoo.org/glsa/202408-02
reference_id GLSA-202408-02
reference_type
scores
url https://security.gentoo.org/glsa/202408-02
11
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
12
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-25
reference_id mfsa2024-25
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-25
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-25/
reference_id mfsa2024-25
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/
url https://www.mozilla.org/security/advisories/mfsa2024-25/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-26
reference_id mfsa2024-26
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-26
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-26/
reference_id mfsa2024-26
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/
url https://www.mozilla.org/security/advisories/mfsa2024-26/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-28
reference_id mfsa2024-28
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-28
18
reference_url https://www.mozilla.org/security/advisories/mfsa2024-28/
reference_id mfsa2024-28
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/
url https://www.mozilla.org/security/advisories/mfsa2024-28/
19
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html
20
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html
21
reference_url https://access.redhat.com/errata/RHSA-2024:3949
reference_id RHSA-2024:3949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3949
22
reference_url https://access.redhat.com/errata/RHSA-2024:3950
reference_id RHSA-2024:3950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3950
23
reference_url https://access.redhat.com/errata/RHSA-2024:3951
reference_id RHSA-2024:3951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3951
24
reference_url https://access.redhat.com/errata/RHSA-2024:3952
reference_id RHSA-2024:3952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3952
25
reference_url https://access.redhat.com/errata/RHSA-2024:3953
reference_id RHSA-2024:3953
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3953
26
reference_url https://access.redhat.com/errata/RHSA-2024:3954
reference_id RHSA-2024:3954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3954
27
reference_url https://access.redhat.com/errata/RHSA-2024:3955
reference_id RHSA-2024:3955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3955
28
reference_url https://access.redhat.com/errata/RHSA-2024:3958
reference_id RHSA-2024:3958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3958
29
reference_url https://access.redhat.com/errata/RHSA-2024:3972
reference_id RHSA-2024:3972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3972
30
reference_url https://access.redhat.com/errata/RHSA-2024:4001
reference_id RHSA-2024:4001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4001
31
reference_url https://access.redhat.com/errata/RHSA-2024:4002
reference_id RHSA-2024:4002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4002
32
reference_url https://access.redhat.com/errata/RHSA-2024:4003
reference_id RHSA-2024:4003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4003
33
reference_url https://access.redhat.com/errata/RHSA-2024:4004
reference_id RHSA-2024:4004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4004
34
reference_url https://access.redhat.com/errata/RHSA-2024:4015
reference_id RHSA-2024:4015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4015
35
reference_url https://access.redhat.com/errata/RHSA-2024:4016
reference_id RHSA-2024:4016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4016
36
reference_url https://access.redhat.com/errata/RHSA-2024:4018
reference_id RHSA-2024:4018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4018
37
reference_url https://access.redhat.com/errata/RHSA-2024:4036
reference_id RHSA-2024:4036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4036
38
reference_url https://access.redhat.com/errata/RHSA-2024:4063
reference_id RHSA-2024:4063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4063
39
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1896555
reference_id show_bug.cgi?id=1896555
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1896555
40
reference_url https://usn.ubuntu.com/6840-1/
reference_id USN-6840-1
reference_type
scores
url https://usn.ubuntu.com/6840-1/
41
reference_url https://usn.ubuntu.com/6862-1/
reference_id USN-6862-1
reference_type
scores
url https://usn.ubuntu.com/6862-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-5696
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gpjz-649k-f3he
23
url VCID-gret-hn3p-5kbk
vulnerability_id VCID-gret-hn3p-5kbk
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7531.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7531.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7531
reference_id
reference_type
scores
0
value 0.00062
scoring_system epss
scoring_elements 0.19267
published_at 2026-04-18T12:55:00Z
1
value 0.00062
scoring_system epss
scoring_elements 0.19549
published_at 2026-04-04T12:55:00Z
2
value 0.00062
scoring_system epss
scoring_elements 0.19397
published_at 2026-04-09T12:55:00Z
3
value 0.00062
scoring_system epss
scoring_elements 0.19345
published_at 2026-04-08T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19502
published_at 2026-04-02T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.19266
published_at 2026-04-07T12:55:00Z
6
value 0.00062
scoring_system epss
scoring_elements 0.19259
published_at 2026-04-16T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.19297
published_at 2026-04-13T12:55:00Z
8
value 0.00062
scoring_system epss
scoring_elements 0.19353
published_at 2026-04-12T12:55:00Z
9
value 0.00062
scoring_system epss
scoring_elements 0.19402
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7531
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303148
reference_id 2303148
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303148
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-16T16:06:38Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-16T16:06:38Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-16T16:06:38Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
23
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1905691
reference_id show_bug.cgi?id=1905691
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-16T16:06:38Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1905691
24
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-7531
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gret-hn3p-5kbk
24
url VCID-hetc-sghb-1fcx
vulnerability_id VCID-hetc-sghb-1fcx
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8384.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8384.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8384
reference_id
reference_type
scores
0
value 0.00321
scoring_system epss
scoring_elements 0.55177
published_at 2026-04-02T12:55:00Z
1
value 0.00321
scoring_system epss
scoring_elements 0.55241
published_at 2026-04-18T12:55:00Z
2
value 0.00321
scoring_system epss
scoring_elements 0.55199
published_at 2026-04-13T12:55:00Z
3
value 0.00321
scoring_system epss
scoring_elements 0.55218
published_at 2026-04-12T12:55:00Z
4
value 0.00321
scoring_system epss
scoring_elements 0.55237
published_at 2026-04-16T12:55:00Z
5
value 0.00321
scoring_system epss
scoring_elements 0.55226
published_at 2026-04-09T12:55:00Z
6
value 0.00321
scoring_system epss
scoring_elements 0.55176
published_at 2026-04-07T12:55:00Z
7
value 0.00321
scoring_system epss
scoring_elements 0.55201
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8384
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8384
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2309430
reference_id 2309430
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2309430
5
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
6
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
7
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
reference_id mfsa2024-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-39/
reference_id mfsa2024-39
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/
url https://www.mozilla.org/security/advisories/mfsa2024-39/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
reference_id mfsa2024-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-40/
reference_id mfsa2024-40
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/
url https://www.mozilla.org/security/advisories/mfsa2024-40/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-41
reference_id mfsa2024-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-41
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-41/
reference_id mfsa2024-41
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/
url https://www.mozilla.org/security/advisories/mfsa2024-41/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
reference_id mfsa2024-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-43/
reference_id mfsa2024-43
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/
url https://www.mozilla.org/security/advisories/mfsa2024-43/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-44
reference_id mfsa2024-44
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-44
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-44/
reference_id mfsa2024-44
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/
url https://www.mozilla.org/security/advisories/mfsa2024-44/
18
reference_url https://access.redhat.com/errata/RHSA-2024:6681
reference_id RHSA-2024:6681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6681
19
reference_url https://access.redhat.com/errata/RHSA-2024:6682
reference_id RHSA-2024:6682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6682
20
reference_url https://access.redhat.com/errata/RHSA-2024:6683
reference_id RHSA-2024:6683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6683
21
reference_url https://access.redhat.com/errata/RHSA-2024:6684
reference_id RHSA-2024:6684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6684
22
reference_url https://access.redhat.com/errata/RHSA-2024:6719
reference_id RHSA-2024:6719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6719
23
reference_url https://access.redhat.com/errata/RHSA-2024:6720
reference_id RHSA-2024:6720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6720
24
reference_url https://access.redhat.com/errata/RHSA-2024:6721
reference_id RHSA-2024:6721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6721
25
reference_url https://access.redhat.com/errata/RHSA-2024:6722
reference_id RHSA-2024:6722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6722
26
reference_url https://access.redhat.com/errata/RHSA-2024:6723
reference_id RHSA-2024:6723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6723
27
reference_url https://access.redhat.com/errata/RHSA-2024:6782
reference_id RHSA-2024:6782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6782
28
reference_url https://access.redhat.com/errata/RHSA-2024:6786
reference_id RHSA-2024:6786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6786
29
reference_url https://access.redhat.com/errata/RHSA-2024:6816
reference_id RHSA-2024:6816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6816
30
reference_url https://access.redhat.com/errata/RHSA-2024:6838
reference_id RHSA-2024:6838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6838
31
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
32
reference_url https://access.redhat.com/errata/RHSA-2024:6850
reference_id RHSA-2024:6850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6850
33
reference_url https://access.redhat.com/errata/RHSA-2024:6891
reference_id RHSA-2024:6891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6891
34
reference_url https://access.redhat.com/errata/RHSA-2024:6892
reference_id RHSA-2024:6892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6892
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1911288
reference_id show_bug.cgi?id=1911288
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1911288
36
reference_url https://usn.ubuntu.com/6992-1/
reference_id USN-6992-1
reference_type
scores
url https://usn.ubuntu.com/6992-1/
37
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-8384
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hetc-sghb-1fcx
25
url VCID-hfx8-7x82-zqfk
vulnerability_id VCID-hfx8-7x82-zqfk
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10466.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10466.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10466
reference_id
reference_type
scores
0
value 0.00669
scoring_system epss
scoring_elements 0.71362
published_at 2026-04-18T12:55:00Z
1
value 0.00669
scoring_system epss
scoring_elements 0.71356
published_at 2026-04-16T12:55:00Z
2
value 0.00669
scoring_system epss
scoring_elements 0.7131
published_at 2026-04-13T12:55:00Z
3
value 0.00669
scoring_system epss
scoring_elements 0.71272
published_at 2026-04-02T12:55:00Z
4
value 0.00669
scoring_system epss
scoring_elements 0.71306
published_at 2026-04-08T12:55:00Z
5
value 0.00669
scoring_system epss
scoring_elements 0.71265
published_at 2026-04-07T12:55:00Z
6
value 0.00669
scoring_system epss
scoring_elements 0.7129
published_at 2026-04-04T12:55:00Z
7
value 0.00669
scoring_system epss
scoring_elements 0.71327
published_at 2026-04-12T12:55:00Z
8
value 0.00669
scoring_system epss
scoring_elements 0.71342
published_at 2026-04-11T12:55:00Z
9
value 0.00669
scoring_system epss
scoring_elements 0.71319
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10466
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10466
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322438
reference_id 2322438
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322438
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
reference_id mfsa2024-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-55/
reference_id mfsa2024-55
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:30:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-55/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
reference_id mfsa2024-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-56/
reference_id mfsa2024-56
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:30:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-56/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
reference_id mfsa2024-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-58/
reference_id mfsa2024-58
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:30:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-58/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
reference_id mfsa2024-59
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-59/
reference_id mfsa2024-59
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:30:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-59/
16
reference_url https://access.redhat.com/errata/RHSA-2024:8720
reference_id RHSA-2024:8720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8720
17
reference_url https://access.redhat.com/errata/RHSA-2024:8721
reference_id RHSA-2024:8721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8721
18
reference_url https://access.redhat.com/errata/RHSA-2024:8722
reference_id RHSA-2024:8722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8722
19
reference_url https://access.redhat.com/errata/RHSA-2024:8723
reference_id RHSA-2024:8723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8723
20
reference_url https://access.redhat.com/errata/RHSA-2024:8724
reference_id RHSA-2024:8724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8724
21
reference_url https://access.redhat.com/errata/RHSA-2024:8725
reference_id RHSA-2024:8725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8725
22
reference_url https://access.redhat.com/errata/RHSA-2024:8726
reference_id RHSA-2024:8726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8726
23
reference_url https://access.redhat.com/errata/RHSA-2024:8727
reference_id RHSA-2024:8727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8727
24
reference_url https://access.redhat.com/errata/RHSA-2024:8728
reference_id RHSA-2024:8728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8728
25
reference_url https://access.redhat.com/errata/RHSA-2024:8729
reference_id RHSA-2024:8729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8729
26
reference_url https://access.redhat.com/errata/RHSA-2024:8790
reference_id RHSA-2024:8790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8790
27
reference_url https://access.redhat.com/errata/RHSA-2024:8793
reference_id RHSA-2024:8793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8793
28
reference_url https://access.redhat.com/errata/RHSA-2024:9015
reference_id RHSA-2024:9015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9015
29
reference_url https://access.redhat.com/errata/RHSA-2024:9016
reference_id RHSA-2024:9016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9016
30
reference_url https://access.redhat.com/errata/RHSA-2024:9017
reference_id RHSA-2024:9017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9017
31
reference_url https://access.redhat.com/errata/RHSA-2024:9018
reference_id RHSA-2024:9018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9018
32
reference_url https://access.redhat.com/errata/RHSA-2024:9019
reference_id RHSA-2024:9019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9019
33
reference_url https://access.redhat.com/errata/RHSA-2024:9552
reference_id RHSA-2024:9552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9552
34
reference_url https://access.redhat.com/errata/RHSA-2024:9554
reference_id RHSA-2024:9554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9554
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1924154
reference_id show_bug.cgi?id=1924154
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:30:57Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1924154
36
reference_url https://usn.ubuntu.com/7086-1/
reference_id USN-7086-1
reference_type
scores
url https://usn.ubuntu.com/7086-1/
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-10466
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hfx8-7x82-zqfk
26
url VCID-hu6v-g43k-9uep
vulnerability_id VCID-hu6v-g43k-9uep
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9395.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9395.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9395
reference_id
reference_type
scores
0
value 0.00286
scoring_system epss
scoring_elements 0.52118
published_at 2026-04-18T12:55:00Z
1
value 0.00286
scoring_system epss
scoring_elements 0.52059
published_at 2026-04-08T12:55:00Z
2
value 0.00286
scoring_system epss
scoring_elements 0.52056
published_at 2026-04-09T12:55:00Z
3
value 0.00286
scoring_system epss
scoring_elements 0.52108
published_at 2026-04-11T12:55:00Z
4
value 0.00286
scoring_system epss
scoring_elements 0.52091
published_at 2026-04-12T12:55:00Z
5
value 0.00286
scoring_system epss
scoring_elements 0.52074
published_at 2026-04-13T12:55:00Z
6
value 0.00286
scoring_system epss
scoring_elements 0.52114
published_at 2026-04-16T12:55:00Z
7
value 0.00286
scoring_system epss
scoring_elements 0.52013
published_at 2026-04-02T12:55:00Z
8
value 0.00286
scoring_system epss
scoring_elements 0.52039
published_at 2026-04-04T12:55:00Z
9
value 0.00286
scoring_system epss
scoring_elements 0.52005
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9395
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315958
reference_id 2315958
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315958
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:40:46Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1906024
reference_id show_bug.cgi?id=1906024
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:40:46Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1906024
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-9395
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hu6v-g43k-9uep
27
url VCID-jebk-6hja-ukfc
vulnerability_id VCID-jebk-6hja-ukfc
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9402.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9402.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9402
reference_id
reference_type
scores
0
value 0.00125
scoring_system epss
scoring_elements 0.31764
published_at 2026-04-18T12:55:00Z
1
value 0.00125
scoring_system epss
scoring_elements 0.31785
published_at 2026-04-16T12:55:00Z
2
value 0.00125
scoring_system epss
scoring_elements 0.31753
published_at 2026-04-13T12:55:00Z
3
value 0.00125
scoring_system epss
scoring_elements 0.31789
published_at 2026-04-12T12:55:00Z
4
value 0.00125
scoring_system epss
scoring_elements 0.31829
published_at 2026-04-11T12:55:00Z
5
value 0.00125
scoring_system epss
scoring_elements 0.31826
published_at 2026-04-09T12:55:00Z
6
value 0.00125
scoring_system epss
scoring_elements 0.31796
published_at 2026-04-08T12:55:00Z
7
value 0.00125
scoring_system epss
scoring_elements 0.31883
published_at 2026-04-02T12:55:00Z
8
value 0.00125
scoring_system epss
scoring_elements 0.31745
published_at 2026-04-07T12:55:00Z
9
value 0.00125
scoring_system epss
scoring_elements 0.31926
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9402
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315951
reference_id 2315951
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315951
4
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1913445%2C1914106%2C1914475%2C1914963%2C1915008%2C1916476
reference_id buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1913445%2C1914106%2C1914475%2C1914963%2C1915008%2C1916476
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:36:13Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1913445%2C1914106%2C1914475%2C1914963%2C1915008%2C1916476
5
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
6
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:36:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:36:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:36:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:36:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
16
reference_url https://access.redhat.com/errata/RHSA-2024:7505
reference_id RHSA-2024:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7505
17
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
18
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
19
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
20
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
21
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
22
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
23
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
24
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
25
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
26
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
27
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
28
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
29
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
30
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
31
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
32
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
33
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
34
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-9402
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jebk-6hja-ukfc
28
url VCID-jt6f-rpfx-7kbj
vulnerability_id VCID-jt6f-rpfx-7kbj
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8383.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8383.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8383
reference_id
reference_type
scores
0
value 0.00223
scoring_system epss
scoring_elements 0.44901
published_at 2026-04-07T12:55:00Z
1
value 0.00223
scoring_system epss
scoring_elements 0.44976
published_at 2026-04-11T12:55:00Z
2
value 0.00223
scoring_system epss
scoring_elements 0.44954
published_at 2026-04-09T12:55:00Z
3
value 0.00223
scoring_system epss
scoring_elements 0.44939
published_at 2026-04-02T12:55:00Z
4
value 0.00223
scoring_system epss
scoring_elements 0.4496
published_at 2026-04-04T12:55:00Z
5
value 0.00223
scoring_system epss
scoring_elements 0.44953
published_at 2026-04-08T12:55:00Z
6
value 0.00223
scoring_system epss
scoring_elements 0.44991
published_at 2026-04-18T12:55:00Z
7
value 0.00223
scoring_system epss
scoring_elements 0.44997
published_at 2026-04-16T12:55:00Z
8
value 0.00223
scoring_system epss
scoring_elements 0.44946
published_at 2026-04-13T12:55:00Z
9
value 0.00223
scoring_system epss
scoring_elements 0.44944
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8383
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8383
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2309429
reference_id 2309429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2309429
5
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
6
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
7
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
reference_id mfsa2024-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-39/
reference_id mfsa2024-39
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-30T16:16:58Z/
url https://www.mozilla.org/security/advisories/mfsa2024-39/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
reference_id mfsa2024-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-40/
reference_id mfsa2024-40
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-30T16:16:58Z/
url https://www.mozilla.org/security/advisories/mfsa2024-40/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-41
reference_id mfsa2024-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-41
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-41/
reference_id mfsa2024-41
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-30T16:16:58Z/
url https://www.mozilla.org/security/advisories/mfsa2024-41/
14
reference_url https://access.redhat.com/errata/RHSA-2024:6681
reference_id RHSA-2024:6681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6681
15
reference_url https://access.redhat.com/errata/RHSA-2024:6682
reference_id RHSA-2024:6682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6682
16
reference_url https://access.redhat.com/errata/RHSA-2024:6782
reference_id RHSA-2024:6782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6782
17
reference_url https://access.redhat.com/errata/RHSA-2024:6786
reference_id RHSA-2024:6786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6786
18
reference_url https://access.redhat.com/errata/RHSA-2024:6838
reference_id RHSA-2024:6838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6838
19
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
20
reference_url https://access.redhat.com/errata/RHSA-2024:6850
reference_id RHSA-2024:6850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6850
21
reference_url https://access.redhat.com/errata/RHSA-2024:6891
reference_id RHSA-2024:6891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6891
22
reference_url https://access.redhat.com/errata/RHSA-2024:6892
reference_id RHSA-2024:6892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6892
23
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1908496
reference_id show_bug.cgi?id=1908496
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-30T16:16:58Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1908496
24
reference_url https://usn.ubuntu.com/6992-1/
reference_id USN-6992-1
reference_type
scores
url https://usn.ubuntu.com/6992-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-8383
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jt6f-rpfx-7kbj
29
url VCID-k3ec-bt9r-pkhg
vulnerability_id VCID-k3ec-bt9r-pkhg
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9397.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9397.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9397
reference_id
reference_type
scores
0
value 0.00218
scoring_system epss
scoring_elements 0.44502
published_at 2026-04-18T12:55:00Z
1
value 0.00218
scoring_system epss
scoring_elements 0.44511
published_at 2026-04-16T12:55:00Z
2
value 0.00218
scoring_system epss
scoring_elements 0.44456
published_at 2026-04-12T12:55:00Z
3
value 0.00218
scoring_system epss
scoring_elements 0.44486
published_at 2026-04-11T12:55:00Z
4
value 0.00218
scoring_system epss
scoring_elements 0.4447
published_at 2026-04-09T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.44463
published_at 2026-04-08T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.44412
published_at 2026-04-07T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44455
published_at 2026-04-13T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.44476
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9397
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315949
reference_id 2315949
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315949
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
15
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
16
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
17
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
18
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
19
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
20
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
21
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
22
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
23
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
24
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
25
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
26
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
27
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
28
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
29
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
30
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
31
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1916659
reference_id show_bug.cgi?id=1916659
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:55:57Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1916659
32
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
33
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-9397
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k3ec-bt9r-pkhg
30
url VCID-ka9e-ps8e-ryc8
vulnerability_id VCID-ka9e-ps8e-ryc8
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9392.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9392.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9392
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.3513
published_at 2026-04-18T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.35144
published_at 2026-04-16T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35106
published_at 2026-04-13T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.35131
published_at 2026-04-12T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.35091
published_at 2026-04-07T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.35162
published_at 2026-04-09T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.35136
published_at 2026-04-08T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35181
published_at 2026-04-02T12:55:00Z
8
value 0.00147
scoring_system epss
scoring_elements 0.3521
published_at 2026-04-04T12:55:00Z
9
value 0.00147
scoring_system epss
scoring_elements 0.35166
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9392
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9392
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315959
reference_id 2315959
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315959
5
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
6
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
reference_id mfsa2024-48
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-48/
reference_id mfsa2024-48
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-48/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
18
reference_url https://access.redhat.com/errata/RHSA-2024:7505
reference_id RHSA-2024:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7505
19
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
20
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
21
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
22
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
23
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
24
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
25
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
26
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
27
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
28
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
29
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
30
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
31
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
32
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
33
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
34
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1899154
reference_id show_bug.cgi?id=1899154
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1899154
36
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1905843
reference_id show_bug.cgi?id=1905843
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1905843
37
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-9392
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ka9e-ps8e-ryc8
31
url VCID-kpun-mgtm-5uhd
vulnerability_id VCID-kpun-mgtm-5uhd
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9399.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9399.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9399
reference_id
reference_type
scores
0
value 0.0026
scoring_system epss
scoring_elements 0.49391
published_at 2026-04-18T12:55:00Z
1
value 0.0026
scoring_system epss
scoring_elements 0.49395
published_at 2026-04-16T12:55:00Z
2
value 0.0026
scoring_system epss
scoring_elements 0.49347
published_at 2026-04-13T12:55:00Z
3
value 0.0026
scoring_system epss
scoring_elements 0.49321
published_at 2026-04-02T12:55:00Z
4
value 0.0026
scoring_system epss
scoring_elements 0.49358
published_at 2026-04-08T12:55:00Z
5
value 0.0026
scoring_system epss
scoring_elements 0.49304
published_at 2026-04-07T12:55:00Z
6
value 0.0026
scoring_system epss
scoring_elements 0.49349
published_at 2026-04-04T12:55:00Z
7
value 0.0026
scoring_system epss
scoring_elements 0.49345
published_at 2026-04-12T12:55:00Z
8
value 0.0026
scoring_system epss
scoring_elements 0.49371
published_at 2026-04-11T12:55:00Z
9
value 0.0026
scoring_system epss
scoring_elements 0.49353
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9399
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315945
reference_id 2315945
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315945
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:39:09Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:39:09Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:39:09Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:39:09Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
15
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
16
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
17
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
18
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
19
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
20
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
21
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
22
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
23
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
24
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
25
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
26
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
27
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
28
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
29
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
30
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
31
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1907726
reference_id show_bug.cgi?id=1907726
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:39:09Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1907726
32
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
33
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-9399
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kpun-mgtm-5uhd
32
url VCID-mj7u-bpwq-jkhu
vulnerability_id VCID-mj7u-bpwq-jkhu
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8389.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8389.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8389
reference_id
reference_type
scores
0
value 0.0072
scoring_system epss
scoring_elements 0.72514
published_at 2026-04-18T12:55:00Z
1
value 0.0072
scoring_system epss
scoring_elements 0.72456
published_at 2026-04-08T12:55:00Z
2
value 0.0072
scoring_system epss
scoring_elements 0.72468
published_at 2026-04-09T12:55:00Z
3
value 0.0072
scoring_system epss
scoring_elements 0.72492
published_at 2026-04-11T12:55:00Z
4
value 0.0072
scoring_system epss
scoring_elements 0.72474
published_at 2026-04-12T12:55:00Z
5
value 0.0072
scoring_system epss
scoring_elements 0.72464
published_at 2026-04-13T12:55:00Z
6
value 0.0072
scoring_system epss
scoring_elements 0.72506
published_at 2026-04-16T12:55:00Z
7
value 0.0072
scoring_system epss
scoring_elements 0.72423
published_at 2026-04-02T12:55:00Z
8
value 0.0072
scoring_system epss
scoring_elements 0.7244
published_at 2026-04-04T12:55:00Z
9
value 0.0072
scoring_system epss
scoring_elements 0.72417
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8389
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2309435
reference_id 2309435
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2309435
4
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1907230%2C1909367
reference_id buglist.cgi?bug_id=1907230%2C1909367
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:39:40Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1907230%2C1909367
5
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
6
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
7
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
reference_id mfsa2024-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-39/
reference_id mfsa2024-39
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:39:40Z/
url https://www.mozilla.org/security/advisories/mfsa2024-39/
10
reference_url https://usn.ubuntu.com/6992-1/
reference_id USN-6992-1
reference_type
scores
url https://usn.ubuntu.com/6992-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-8389
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mj7u-bpwq-jkhu
33
url VCID-mw96-qtnz-gqdx
vulnerability_id VCID-mw96-qtnz-gqdx
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10465.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10465.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10465
reference_id
reference_type
scores
0
value 0.00502
scoring_system epss
scoring_elements 0.66077
published_at 2026-04-18T12:55:00Z
1
value 0.00502
scoring_system epss
scoring_elements 0.66063
published_at 2026-04-16T12:55:00Z
2
value 0.00502
scoring_system epss
scoring_elements 0.66028
published_at 2026-04-13T12:55:00Z
3
value 0.00502
scoring_system epss
scoring_elements 0.65994
published_at 2026-04-02T12:55:00Z
4
value 0.00502
scoring_system epss
scoring_elements 0.6604
published_at 2026-04-08T12:55:00Z
5
value 0.00502
scoring_system epss
scoring_elements 0.6599
published_at 2026-04-07T12:55:00Z
6
value 0.00502
scoring_system epss
scoring_elements 0.66023
published_at 2026-04-04T12:55:00Z
7
value 0.00502
scoring_system epss
scoring_elements 0.66058
published_at 2026-04-12T12:55:00Z
8
value 0.00502
scoring_system epss
scoring_elements 0.66071
published_at 2026-04-11T12:55:00Z
9
value 0.00502
scoring_system epss
scoring_elements 0.66052
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10465
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10465
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10465
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322434
reference_id 2322434
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322434
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
reference_id mfsa2024-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-55/
reference_id mfsa2024-55
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:41:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-55/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
reference_id mfsa2024-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-56/
reference_id mfsa2024-56
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:41:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-56/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
reference_id mfsa2024-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-58/
reference_id mfsa2024-58
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:41:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-58/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
reference_id mfsa2024-59
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-59/
reference_id mfsa2024-59
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:41:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-59/
16
reference_url https://access.redhat.com/errata/RHSA-2024:8720
reference_id RHSA-2024:8720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8720
17
reference_url https://access.redhat.com/errata/RHSA-2024:8721
reference_id RHSA-2024:8721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8721
18
reference_url https://access.redhat.com/errata/RHSA-2024:8722
reference_id RHSA-2024:8722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8722
19
reference_url https://access.redhat.com/errata/RHSA-2024:8723
reference_id RHSA-2024:8723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8723
20
reference_url https://access.redhat.com/errata/RHSA-2024:8724
reference_id RHSA-2024:8724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8724
21
reference_url https://access.redhat.com/errata/RHSA-2024:8725
reference_id RHSA-2024:8725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8725
22
reference_url https://access.redhat.com/errata/RHSA-2024:8726
reference_id RHSA-2024:8726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8726
23
reference_url https://access.redhat.com/errata/RHSA-2024:8727
reference_id RHSA-2024:8727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8727
24
reference_url https://access.redhat.com/errata/RHSA-2024:8728
reference_id RHSA-2024:8728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8728
25
reference_url https://access.redhat.com/errata/RHSA-2024:8729
reference_id RHSA-2024:8729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8729
26
reference_url https://access.redhat.com/errata/RHSA-2024:8790
reference_id RHSA-2024:8790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8790
27
reference_url https://access.redhat.com/errata/RHSA-2024:8793
reference_id RHSA-2024:8793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8793
28
reference_url https://access.redhat.com/errata/RHSA-2024:9015
reference_id RHSA-2024:9015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9015
29
reference_url https://access.redhat.com/errata/RHSA-2024:9016
reference_id RHSA-2024:9016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9016
30
reference_url https://access.redhat.com/errata/RHSA-2024:9017
reference_id RHSA-2024:9017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9017
31
reference_url https://access.redhat.com/errata/RHSA-2024:9018
reference_id RHSA-2024:9018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9018
32
reference_url https://access.redhat.com/errata/RHSA-2024:9019
reference_id RHSA-2024:9019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9019
33
reference_url https://access.redhat.com/errata/RHSA-2024:9552
reference_id RHSA-2024:9552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9552
34
reference_url https://access.redhat.com/errata/RHSA-2024:9554
reference_id RHSA-2024:9554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9554
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1918853
reference_id show_bug.cgi?id=1918853
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:41:01Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1918853
36
reference_url https://usn.ubuntu.com/7086-1/
reference_id USN-7086-1
reference_type
scores
url https://usn.ubuntu.com/7086-1/
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-10465
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mw96-qtnz-gqdx
34
url VCID-n4hu-b1t6-xkay
vulnerability_id VCID-n4hu-b1t6-xkay
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10458.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10458.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10458
reference_id
reference_type
scores
0
value 0.00456
scoring_system epss
scoring_elements 0.6392
published_at 2026-04-18T12:55:00Z
1
value 0.00456
scoring_system epss
scoring_elements 0.6391
published_at 2026-04-16T12:55:00Z
2
value 0.00456
scoring_system epss
scoring_elements 0.63874
published_at 2026-04-13T12:55:00Z
3
value 0.00456
scoring_system epss
scoring_elements 0.63921
published_at 2026-04-11T12:55:00Z
4
value 0.00456
scoring_system epss
scoring_elements 0.63856
published_at 2026-04-02T12:55:00Z
5
value 0.00456
scoring_system epss
scoring_elements 0.63884
published_at 2026-04-04T12:55:00Z
6
value 0.00456
scoring_system epss
scoring_elements 0.63908
published_at 2026-04-12T12:55:00Z
7
value 0.00456
scoring_system epss
scoring_elements 0.63841
published_at 2026-04-07T12:55:00Z
8
value 0.00456
scoring_system epss
scoring_elements 0.63891
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10458
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10458
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322428
reference_id 2322428
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322428
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
reference_id mfsa2024-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-55/
reference_id mfsa2024-55
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/
url https://www.mozilla.org/security/advisories/mfsa2024-55/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
reference_id mfsa2024-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-56/
reference_id mfsa2024-56
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/
url https://www.mozilla.org/security/advisories/mfsa2024-56/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-57
reference_id mfsa2024-57
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-57
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-57/
reference_id mfsa2024-57
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/
url https://www.mozilla.org/security/advisories/mfsa2024-57/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
reference_id mfsa2024-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-58/
reference_id mfsa2024-58
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/
url https://www.mozilla.org/security/advisories/mfsa2024-58/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
reference_id mfsa2024-59
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-59/
reference_id mfsa2024-59
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/
url https://www.mozilla.org/security/advisories/mfsa2024-59/
18
reference_url https://access.redhat.com/errata/RHSA-2024:8720
reference_id RHSA-2024:8720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8720
19
reference_url https://access.redhat.com/errata/RHSA-2024:8721
reference_id RHSA-2024:8721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8721
20
reference_url https://access.redhat.com/errata/RHSA-2024:8722
reference_id RHSA-2024:8722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8722
21
reference_url https://access.redhat.com/errata/RHSA-2024:8723
reference_id RHSA-2024:8723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8723
22
reference_url https://access.redhat.com/errata/RHSA-2024:8724
reference_id RHSA-2024:8724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8724
23
reference_url https://access.redhat.com/errata/RHSA-2024:8725
reference_id RHSA-2024:8725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8725
24
reference_url https://access.redhat.com/errata/RHSA-2024:8726
reference_id RHSA-2024:8726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8726
25
reference_url https://access.redhat.com/errata/RHSA-2024:8727
reference_id RHSA-2024:8727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8727
26
reference_url https://access.redhat.com/errata/RHSA-2024:8728
reference_id RHSA-2024:8728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8728
27
reference_url https://access.redhat.com/errata/RHSA-2024:8729
reference_id RHSA-2024:8729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8729
28
reference_url https://access.redhat.com/errata/RHSA-2024:8790
reference_id RHSA-2024:8790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8790
29
reference_url https://access.redhat.com/errata/RHSA-2024:8793
reference_id RHSA-2024:8793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8793
30
reference_url https://access.redhat.com/errata/RHSA-2024:9015
reference_id RHSA-2024:9015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9015
31
reference_url https://access.redhat.com/errata/RHSA-2024:9016
reference_id RHSA-2024:9016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9016
32
reference_url https://access.redhat.com/errata/RHSA-2024:9017
reference_id RHSA-2024:9017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9017
33
reference_url https://access.redhat.com/errata/RHSA-2024:9018
reference_id RHSA-2024:9018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9018
34
reference_url https://access.redhat.com/errata/RHSA-2024:9019
reference_id RHSA-2024:9019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9019
35
reference_url https://access.redhat.com/errata/RHSA-2024:9552
reference_id RHSA-2024:9552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9552
36
reference_url https://access.redhat.com/errata/RHSA-2024:9554
reference_id RHSA-2024:9554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9554
37
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1921733
reference_id show_bug.cgi?id=1921733
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-31T17:43:41Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1921733
38
reference_url https://usn.ubuntu.com/7086-1/
reference_id USN-7086-1
reference_type
scores
url https://usn.ubuntu.com/7086-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-10458
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n4hu-b1t6-xkay
35
url VCID-pst5-367g-h7cs
vulnerability_id VCID-pst5-367g-h7cs
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8386.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8386.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8386
reference_id
reference_type
scores
0
value 0.00271
scoring_system epss
scoring_elements 0.50627
published_at 2026-04-18T12:55:00Z
1
value 0.00271
scoring_system epss
scoring_elements 0.50523
published_at 2026-04-07T12:55:00Z
2
value 0.00271
scoring_system epss
scoring_elements 0.50622
published_at 2026-04-16T12:55:00Z
3
value 0.00271
scoring_system epss
scoring_elements 0.5058
published_at 2026-04-13T12:55:00Z
4
value 0.00271
scoring_system epss
scoring_elements 0.50595
published_at 2026-04-12T12:55:00Z
5
value 0.00271
scoring_system epss
scoring_elements 0.50617
published_at 2026-04-11T12:55:00Z
6
value 0.00271
scoring_system epss
scoring_elements 0.50575
published_at 2026-04-09T12:55:00Z
7
value 0.00271
scoring_system epss
scoring_elements 0.50578
published_at 2026-04-08T12:55:00Z
8
value 0.00271
scoring_system epss
scoring_elements 0.50543
published_at 2026-04-02T12:55:00Z
9
value 0.00271
scoring_system epss
scoring_elements 0.5057
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8386
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2309432
reference_id 2309432
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2309432
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
reference_id mfsa2024-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-39/
reference_id mfsa2024-39
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-39/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
reference_id mfsa2024-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-40/
reference_id mfsa2024-40
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-40/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
reference_id mfsa2024-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-43/
reference_id mfsa2024-43
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-43/
13
reference_url https://access.redhat.com/errata/RHSA-2024:6681
reference_id RHSA-2024:6681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6681
14
reference_url https://access.redhat.com/errata/RHSA-2024:6682
reference_id RHSA-2024:6682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6682
15
reference_url https://access.redhat.com/errata/RHSA-2024:6683
reference_id RHSA-2024:6683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6683
16
reference_url https://access.redhat.com/errata/RHSA-2024:6684
reference_id RHSA-2024:6684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6684
17
reference_url https://access.redhat.com/errata/RHSA-2024:6719
reference_id RHSA-2024:6719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6719
18
reference_url https://access.redhat.com/errata/RHSA-2024:6720
reference_id RHSA-2024:6720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6720
19
reference_url https://access.redhat.com/errata/RHSA-2024:6721
reference_id RHSA-2024:6721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6721
20
reference_url https://access.redhat.com/errata/RHSA-2024:6722
reference_id RHSA-2024:6722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6722
21
reference_url https://access.redhat.com/errata/RHSA-2024:6723
reference_id RHSA-2024:6723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6723
22
reference_url https://access.redhat.com/errata/RHSA-2024:6782
reference_id RHSA-2024:6782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6782
23
reference_url https://access.redhat.com/errata/RHSA-2024:6786
reference_id RHSA-2024:6786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6786
24
reference_url https://access.redhat.com/errata/RHSA-2024:6816
reference_id RHSA-2024:6816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6816
25
reference_url https://access.redhat.com/errata/RHSA-2024:6838
reference_id RHSA-2024:6838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6838
26
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
27
reference_url https://access.redhat.com/errata/RHSA-2024:6850
reference_id RHSA-2024:6850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6850
28
reference_url https://access.redhat.com/errata/RHSA-2024:6891
reference_id RHSA-2024:6891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6891
29
reference_url https://access.redhat.com/errata/RHSA-2024:6892
reference_id RHSA-2024:6892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6892
30
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1907032
reference_id show_bug.cgi?id=1907032
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1907032
31
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1909163
reference_id show_bug.cgi?id=1909163
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1909163
32
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1909529
reference_id show_bug.cgi?id=1909529
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1909529
33
reference_url https://usn.ubuntu.com/6992-1/
reference_id USN-6992-1
reference_type
scores
url https://usn.ubuntu.com/6992-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-8386
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pst5-367g-h7cs
36
url VCID-qd97-asaa-2fey
vulnerability_id VCID-qd97-asaa-2fey
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8385.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8385.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8385
reference_id
reference_type
scores
0
value 0.00278
scoring_system epss
scoring_elements 0.51269
published_at 2026-04-18T12:55:00Z
1
value 0.00278
scoring_system epss
scoring_elements 0.51164
published_at 2026-04-07T12:55:00Z
2
value 0.00278
scoring_system epss
scoring_elements 0.51216
published_at 2026-04-09T12:55:00Z
3
value 0.00278
scoring_system epss
scoring_elements 0.51219
published_at 2026-04-08T12:55:00Z
4
value 0.00278
scoring_system epss
scoring_elements 0.51181
published_at 2026-04-02T12:55:00Z
5
value 0.00278
scoring_system epss
scoring_elements 0.51206
published_at 2026-04-04T12:55:00Z
6
value 0.00278
scoring_system epss
scoring_elements 0.51262
published_at 2026-04-16T12:55:00Z
7
value 0.00278
scoring_system epss
scoring_elements 0.51224
published_at 2026-04-13T12:55:00Z
8
value 0.00278
scoring_system epss
scoring_elements 0.51238
published_at 2026-04-12T12:55:00Z
9
value 0.00278
scoring_system epss
scoring_elements 0.51259
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8385
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2309431
reference_id 2309431
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2309431
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
reference_id mfsa2024-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-39/
reference_id mfsa2024-39
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:46:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-39/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
reference_id mfsa2024-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-40/
reference_id mfsa2024-40
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:46:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-40/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
reference_id mfsa2024-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-43/
reference_id mfsa2024-43
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:46:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-43/
13
reference_url https://access.redhat.com/errata/RHSA-2024:6681
reference_id RHSA-2024:6681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6681
14
reference_url https://access.redhat.com/errata/RHSA-2024:6682
reference_id RHSA-2024:6682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6682
15
reference_url https://access.redhat.com/errata/RHSA-2024:6683
reference_id RHSA-2024:6683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6683
16
reference_url https://access.redhat.com/errata/RHSA-2024:6684
reference_id RHSA-2024:6684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6684
17
reference_url https://access.redhat.com/errata/RHSA-2024:6719
reference_id RHSA-2024:6719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6719
18
reference_url https://access.redhat.com/errata/RHSA-2024:6720
reference_id RHSA-2024:6720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6720
19
reference_url https://access.redhat.com/errata/RHSA-2024:6721
reference_id RHSA-2024:6721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6721
20
reference_url https://access.redhat.com/errata/RHSA-2024:6722
reference_id RHSA-2024:6722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6722
21
reference_url https://access.redhat.com/errata/RHSA-2024:6723
reference_id RHSA-2024:6723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6723
22
reference_url https://access.redhat.com/errata/RHSA-2024:6782
reference_id RHSA-2024:6782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6782
23
reference_url https://access.redhat.com/errata/RHSA-2024:6786
reference_id RHSA-2024:6786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6786
24
reference_url https://access.redhat.com/errata/RHSA-2024:6816
reference_id RHSA-2024:6816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6816
25
reference_url https://access.redhat.com/errata/RHSA-2024:6838
reference_id RHSA-2024:6838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6838
26
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
27
reference_url https://access.redhat.com/errata/RHSA-2024:6850
reference_id RHSA-2024:6850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6850
28
reference_url https://access.redhat.com/errata/RHSA-2024:6891
reference_id RHSA-2024:6891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6891
29
reference_url https://access.redhat.com/errata/RHSA-2024:6892
reference_id RHSA-2024:6892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6892
30
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1911909
reference_id show_bug.cgi?id=1911909
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:46:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1911909
31
reference_url https://usn.ubuntu.com/6992-1/
reference_id USN-6992-1
reference_type
scores
url https://usn.ubuntu.com/6992-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-8385
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qd97-asaa-2fey
37
url VCID-rcg4-7hjg-v7du
vulnerability_id VCID-rcg4-7hjg-v7du
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10463.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10463.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10463
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.64522
published_at 2026-04-18T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.6451
published_at 2026-04-16T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.64476
published_at 2026-04-13T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.64504
published_at 2026-04-12T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.64477
published_at 2026-04-04T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.64436
published_at 2026-04-07T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64447
published_at 2026-04-02T12:55:00Z
7
value 0.00468
scoring_system epss
scoring_elements 0.64516
published_at 2026-04-11T12:55:00Z
8
value 0.00468
scoring_system epss
scoring_elements 0.64501
published_at 2026-04-09T12:55:00Z
9
value 0.00468
scoring_system epss
scoring_elements 0.64484
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10463
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10463
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322439
reference_id 2322439
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322439
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
reference_id mfsa2024-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-55/
reference_id mfsa2024-55
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/
url https://www.mozilla.org/security/advisories/mfsa2024-55/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
reference_id mfsa2024-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-56/
reference_id mfsa2024-56
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/
url https://www.mozilla.org/security/advisories/mfsa2024-56/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-57
reference_id mfsa2024-57
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-57
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-57/
reference_id mfsa2024-57
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/
url https://www.mozilla.org/security/advisories/mfsa2024-57/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
reference_id mfsa2024-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-58/
reference_id mfsa2024-58
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/
url https://www.mozilla.org/security/advisories/mfsa2024-58/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
reference_id mfsa2024-59
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-59/
reference_id mfsa2024-59
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/
url https://www.mozilla.org/security/advisories/mfsa2024-59/
18
reference_url https://access.redhat.com/errata/RHSA-2024:8720
reference_id RHSA-2024:8720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8720
19
reference_url https://access.redhat.com/errata/RHSA-2024:8721
reference_id RHSA-2024:8721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8721
20
reference_url https://access.redhat.com/errata/RHSA-2024:8722
reference_id RHSA-2024:8722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8722
21
reference_url https://access.redhat.com/errata/RHSA-2024:8723
reference_id RHSA-2024:8723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8723
22
reference_url https://access.redhat.com/errata/RHSA-2024:8724
reference_id RHSA-2024:8724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8724
23
reference_url https://access.redhat.com/errata/RHSA-2024:8725
reference_id RHSA-2024:8725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8725
24
reference_url https://access.redhat.com/errata/RHSA-2024:8726
reference_id RHSA-2024:8726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8726
25
reference_url https://access.redhat.com/errata/RHSA-2024:8727
reference_id RHSA-2024:8727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8727
26
reference_url https://access.redhat.com/errata/RHSA-2024:8728
reference_id RHSA-2024:8728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8728
27
reference_url https://access.redhat.com/errata/RHSA-2024:8729
reference_id RHSA-2024:8729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8729
28
reference_url https://access.redhat.com/errata/RHSA-2024:8790
reference_id RHSA-2024:8790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8790
29
reference_url https://access.redhat.com/errata/RHSA-2024:8793
reference_id RHSA-2024:8793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8793
30
reference_url https://access.redhat.com/errata/RHSA-2024:9015
reference_id RHSA-2024:9015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9015
31
reference_url https://access.redhat.com/errata/RHSA-2024:9016
reference_id RHSA-2024:9016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9016
32
reference_url https://access.redhat.com/errata/RHSA-2024:9017
reference_id RHSA-2024:9017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9017
33
reference_url https://access.redhat.com/errata/RHSA-2024:9018
reference_id RHSA-2024:9018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9018
34
reference_url https://access.redhat.com/errata/RHSA-2024:9019
reference_id RHSA-2024:9019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9019
35
reference_url https://access.redhat.com/errata/RHSA-2024:9552
reference_id RHSA-2024:9552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9552
36
reference_url https://access.redhat.com/errata/RHSA-2024:9554
reference_id RHSA-2024:9554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9554
37
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1920800
reference_id show_bug.cgi?id=1920800
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:52:00Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1920800
38
reference_url https://usn.ubuntu.com/7086-1/
reference_id USN-7086-1
reference_type
scores
url https://usn.ubuntu.com/7086-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-10463
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rcg4-7hjg-v7du
38
url VCID-s556-eg79-77gu
vulnerability_id VCID-s556-eg79-77gu
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7522.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7522.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7522
reference_id
reference_type
scores
0
value 0.00247
scoring_system epss
scoring_elements 0.47992
published_at 2026-04-18T12:55:00Z
1
value 0.00247
scoring_system epss
scoring_elements 0.47914
published_at 2026-04-02T12:55:00Z
2
value 0.00247
scoring_system epss
scoring_elements 0.47997
published_at 2026-04-16T12:55:00Z
3
value 0.00247
scoring_system epss
scoring_elements 0.47942
published_at 2026-04-13T12:55:00Z
4
value 0.00247
scoring_system epss
scoring_elements 0.47884
published_at 2026-04-07T12:55:00Z
5
value 0.00247
scoring_system epss
scoring_elements 0.47936
published_at 2026-04-08T12:55:00Z
6
value 0.00247
scoring_system epss
scoring_elements 0.47935
published_at 2026-04-04T12:55:00Z
7
value 0.00247
scoring_system epss
scoring_elements 0.47933
published_at 2026-04-12T12:55:00Z
8
value 0.00247
scoring_system epss
scoring_elements 0.47955
published_at 2026-04-11T12:55:00Z
9
value 0.00247
scoring_system epss
scoring_elements 0.47931
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7522
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303139
reference_id 2303139
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303139
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
reference_id mfsa2024-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
25
reference_url https://www.mozilla.org/security/advisories/mfsa2024-38/
reference_id mfsa2024-38
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/
url https://www.mozilla.org/security/advisories/mfsa2024-38/
26
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
27
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
28
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
29
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
30
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
31
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
32
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
33
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
34
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
35
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
36
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
37
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
38
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
39
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
40
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
41
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
42
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
43
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1906727
reference_id show_bug.cgi?id=1906727
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1906727
44
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
45
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-7522
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s556-eg79-77gu
39
url VCID-sg2y-gfue-6qam
vulnerability_id VCID-sg2y-gfue-6qam
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10461.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10461.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10461
reference_id
reference_type
scores
0
value 0.00944
scoring_system epss
scoring_elements 0.7635
published_at 2026-04-18T12:55:00Z
1
value 0.00944
scoring_system epss
scoring_elements 0.76345
published_at 2026-04-16T12:55:00Z
2
value 0.00944
scoring_system epss
scoring_elements 0.76309
published_at 2026-04-12T12:55:00Z
3
value 0.00944
scoring_system epss
scoring_elements 0.76278
published_at 2026-04-04T12:55:00Z
4
value 0.00944
scoring_system epss
scoring_elements 0.76259
published_at 2026-04-07T12:55:00Z
5
value 0.00944
scoring_system epss
scoring_elements 0.76248
published_at 2026-04-02T12:55:00Z
6
value 0.00944
scoring_system epss
scoring_elements 0.76331
published_at 2026-04-11T12:55:00Z
7
value 0.00944
scoring_system epss
scoring_elements 0.76305
published_at 2026-04-13T12:55:00Z
8
value 0.00944
scoring_system epss
scoring_elements 0.76291
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10461
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10461
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322425
reference_id 2322425
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322425
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
reference_id mfsa2024-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-55/
reference_id mfsa2024-55
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:04:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-55/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
reference_id mfsa2024-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-56/
reference_id mfsa2024-56
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:04:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-56/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
reference_id mfsa2024-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-58/
reference_id mfsa2024-58
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:04:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-58/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
reference_id mfsa2024-59
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-59/
reference_id mfsa2024-59
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:04:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-59/
16
reference_url https://access.redhat.com/errata/RHSA-2024:8720
reference_id RHSA-2024:8720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8720
17
reference_url https://access.redhat.com/errata/RHSA-2024:8721
reference_id RHSA-2024:8721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8721
18
reference_url https://access.redhat.com/errata/RHSA-2024:8722
reference_id RHSA-2024:8722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8722
19
reference_url https://access.redhat.com/errata/RHSA-2024:8723
reference_id RHSA-2024:8723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8723
20
reference_url https://access.redhat.com/errata/RHSA-2024:8724
reference_id RHSA-2024:8724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8724
21
reference_url https://access.redhat.com/errata/RHSA-2024:8725
reference_id RHSA-2024:8725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8725
22
reference_url https://access.redhat.com/errata/RHSA-2024:8726
reference_id RHSA-2024:8726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8726
23
reference_url https://access.redhat.com/errata/RHSA-2024:8727
reference_id RHSA-2024:8727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8727
24
reference_url https://access.redhat.com/errata/RHSA-2024:8728
reference_id RHSA-2024:8728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8728
25
reference_url https://access.redhat.com/errata/RHSA-2024:8729
reference_id RHSA-2024:8729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8729
26
reference_url https://access.redhat.com/errata/RHSA-2024:8790
reference_id RHSA-2024:8790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8790
27
reference_url https://access.redhat.com/errata/RHSA-2024:8793
reference_id RHSA-2024:8793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8793
28
reference_url https://access.redhat.com/errata/RHSA-2024:9015
reference_id RHSA-2024:9015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9015
29
reference_url https://access.redhat.com/errata/RHSA-2024:9016
reference_id RHSA-2024:9016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9016
30
reference_url https://access.redhat.com/errata/RHSA-2024:9017
reference_id RHSA-2024:9017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9017
31
reference_url https://access.redhat.com/errata/RHSA-2024:9018
reference_id RHSA-2024:9018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9018
32
reference_url https://access.redhat.com/errata/RHSA-2024:9019
reference_id RHSA-2024:9019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9019
33
reference_url https://access.redhat.com/errata/RHSA-2024:9552
reference_id RHSA-2024:9552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9552
34
reference_url https://access.redhat.com/errata/RHSA-2024:9554
reference_id RHSA-2024:9554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9554
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1914521
reference_id show_bug.cgi?id=1914521
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-29T14:04:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1914521
36
reference_url https://usn.ubuntu.com/7086-1/
reference_id USN-7086-1
reference_type
scores
url https://usn.ubuntu.com/7086-1/
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-10461
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sg2y-gfue-6qam
40
url VCID-svqy-5b6h-7yfj
vulnerability_id VCID-svqy-5b6h-7yfj
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6603.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6603.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6603
reference_id
reference_type
scores
0
value 0.00344
scoring_system epss
scoring_elements 0.57095
published_at 2026-04-16T12:55:00Z
1
value 0.00344
scoring_system epss
scoring_elements 0.57067
published_at 2026-04-13T12:55:00Z
2
value 0.00344
scoring_system epss
scoring_elements 0.57048
published_at 2026-04-02T12:55:00Z
3
value 0.00344
scoring_system epss
scoring_elements 0.571
published_at 2026-04-09T12:55:00Z
4
value 0.00344
scoring_system epss
scoring_elements 0.57098
published_at 2026-04-08T12:55:00Z
5
value 0.00344
scoring_system epss
scoring_elements 0.57047
published_at 2026-04-07T12:55:00Z
6
value 0.00344
scoring_system epss
scoring_elements 0.57069
published_at 2026-04-04T12:55:00Z
7
value 0.00344
scoring_system epss
scoring_elements 0.5709
published_at 2026-04-18T12:55:00Z
8
value 0.00344
scoring_system epss
scoring_elements 0.57111
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6603
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2296638
reference_id 2296638
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2296638
9
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
10
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
11
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
reference_id mfsa2024-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-29/
reference_id mfsa2024-29
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T15:12:02Z/
url https://www.mozilla.org/security/advisories/mfsa2024-29/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-30
reference_id mfsa2024-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-30
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-30/
reference_id mfsa2024-30
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T15:12:02Z/
url https://www.mozilla.org/security/advisories/mfsa2024-30/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-31
reference_id mfsa2024-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-31
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-31/
reference_id mfsa2024-31
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T15:12:02Z/
url https://www.mozilla.org/security/advisories/mfsa2024-31/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
reference_id mfsa2024-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-32/
reference_id mfsa2024-32
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T15:12:02Z/
url https://www.mozilla.org/security/advisories/mfsa2024-32/
20
reference_url https://access.redhat.com/errata/RHSA-2024:4500
reference_id RHSA-2024:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4500
21
reference_url https://access.redhat.com/errata/RHSA-2024:4501
reference_id RHSA-2024:4501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4501
22
reference_url https://access.redhat.com/errata/RHSA-2024:4508
reference_id RHSA-2024:4508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4508
23
reference_url https://access.redhat.com/errata/RHSA-2024:4517
reference_id RHSA-2024:4517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4517
24
reference_url https://access.redhat.com/errata/RHSA-2024:4586
reference_id RHSA-2024:4586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4586
25
reference_url https://access.redhat.com/errata/RHSA-2024:4590
reference_id RHSA-2024:4590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4590
26
reference_url https://access.redhat.com/errata/RHSA-2024:4610
reference_id RHSA-2024:4610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4610
27
reference_url https://access.redhat.com/errata/RHSA-2024:4624
reference_id RHSA-2024:4624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4624
28
reference_url https://access.redhat.com/errata/RHSA-2024:4625
reference_id RHSA-2024:4625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4625
29
reference_url https://access.redhat.com/errata/RHSA-2024:4634
reference_id RHSA-2024:4634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4634
30
reference_url https://access.redhat.com/errata/RHSA-2024:4635
reference_id RHSA-2024:4635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4635
31
reference_url https://access.redhat.com/errata/RHSA-2024:4670
reference_id RHSA-2024:4670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4670
32
reference_url https://access.redhat.com/errata/RHSA-2024:4671
reference_id RHSA-2024:4671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4671
33
reference_url https://access.redhat.com/errata/RHSA-2024:4673
reference_id RHSA-2024:4673
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4673
34
reference_url https://access.redhat.com/errata/RHSA-2024:4717
reference_id RHSA-2024:4717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4717
35
reference_url https://access.redhat.com/errata/RHSA-2024:4718
reference_id RHSA-2024:4718
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4718
36
reference_url https://access.redhat.com/errata/RHSA-2024:4894
reference_id RHSA-2024:4894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4894
37
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1895081
reference_id show_bug.cgi?id=1895081
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T15:12:02Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1895081
38
reference_url https://usn.ubuntu.com/6890-1/
reference_id USN-6890-1
reference_type
scores
url https://usn.ubuntu.com/6890-1/
39
reference_url https://usn.ubuntu.com/6903-1/
reference_id USN-6903-1
reference_type
scores
url https://usn.ubuntu.com/6903-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-6603
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-svqy-5b6h-7yfj
41
url VCID-t52p-7rr7-57ax
vulnerability_id VCID-t52p-7rr7-57ax
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6604.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6604.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6604
reference_id
reference_type
scores
0
value 0.0038
scoring_system epss
scoring_elements 0.59526
published_at 2026-04-18T12:55:00Z
1
value 0.0038
scoring_system epss
scoring_elements 0.5952
published_at 2026-04-16T12:55:00Z
2
value 0.0038
scoring_system epss
scoring_elements 0.59447
published_at 2026-04-02T12:55:00Z
3
value 0.0038
scoring_system epss
scoring_elements 0.59503
published_at 2026-04-09T12:55:00Z
4
value 0.0038
scoring_system epss
scoring_elements 0.5949
published_at 2026-04-08T12:55:00Z
5
value 0.0038
scoring_system epss
scoring_elements 0.59439
published_at 2026-04-07T12:55:00Z
6
value 0.0038
scoring_system epss
scoring_elements 0.59472
published_at 2026-04-04T12:55:00Z
7
value 0.0038
scoring_system epss
scoring_elements 0.59486
published_at 2026-04-13T12:55:00Z
8
value 0.0038
scoring_system epss
scoring_elements 0.59506
published_at 2026-04-12T12:55:00Z
9
value 0.0038
scoring_system epss
scoring_elements 0.59522
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6604
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2296639
reference_id 2296639
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2296639
9
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1748105%2C1837550%2C1884266
reference_id buglist.cgi?bug_id=1748105%2C1837550%2C1884266
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:20:14Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1748105%2C1837550%2C1884266
10
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
11
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
12
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
reference_id mfsa2024-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-29/
reference_id mfsa2024-29
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:20:14Z/
url https://www.mozilla.org/security/advisories/mfsa2024-29/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-30
reference_id mfsa2024-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-30
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-30/
reference_id mfsa2024-30
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:20:14Z/
url https://www.mozilla.org/security/advisories/mfsa2024-30/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-31
reference_id mfsa2024-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-31
18
reference_url https://www.mozilla.org/security/advisories/mfsa2024-31/
reference_id mfsa2024-31
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:20:14Z/
url https://www.mozilla.org/security/advisories/mfsa2024-31/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
reference_id mfsa2024-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
20
reference_url https://www.mozilla.org/security/advisories/mfsa2024-32/
reference_id mfsa2024-32
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:20:14Z/
url https://www.mozilla.org/security/advisories/mfsa2024-32/
21
reference_url https://access.redhat.com/errata/RHSA-2024:4500
reference_id RHSA-2024:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4500
22
reference_url https://access.redhat.com/errata/RHSA-2024:4501
reference_id RHSA-2024:4501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4501
23
reference_url https://access.redhat.com/errata/RHSA-2024:4508
reference_id RHSA-2024:4508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4508
24
reference_url https://access.redhat.com/errata/RHSA-2024:4517
reference_id RHSA-2024:4517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4517
25
reference_url https://access.redhat.com/errata/RHSA-2024:4586
reference_id RHSA-2024:4586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4586
26
reference_url https://access.redhat.com/errata/RHSA-2024:4590
reference_id RHSA-2024:4590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4590
27
reference_url https://access.redhat.com/errata/RHSA-2024:4610
reference_id RHSA-2024:4610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4610
28
reference_url https://access.redhat.com/errata/RHSA-2024:4624
reference_id RHSA-2024:4624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4624
29
reference_url https://access.redhat.com/errata/RHSA-2024:4625
reference_id RHSA-2024:4625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4625
30
reference_url https://access.redhat.com/errata/RHSA-2024:4634
reference_id RHSA-2024:4634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4634
31
reference_url https://access.redhat.com/errata/RHSA-2024:4635
reference_id RHSA-2024:4635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4635
32
reference_url https://access.redhat.com/errata/RHSA-2024:4670
reference_id RHSA-2024:4670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4670
33
reference_url https://access.redhat.com/errata/RHSA-2024:4671
reference_id RHSA-2024:4671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4671
34
reference_url https://access.redhat.com/errata/RHSA-2024:4673
reference_id RHSA-2024:4673
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4673
35
reference_url https://access.redhat.com/errata/RHSA-2024:4717
reference_id RHSA-2024:4717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4717
36
reference_url https://access.redhat.com/errata/RHSA-2024:4718
reference_id RHSA-2024:4718
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4718
37
reference_url https://access.redhat.com/errata/RHSA-2024:4894
reference_id RHSA-2024:4894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4894
38
reference_url https://usn.ubuntu.com/6890-1/
reference_id USN-6890-1
reference_type
scores
url https://usn.ubuntu.com/6890-1/
39
reference_url https://usn.ubuntu.com/6903-1/
reference_id USN-6903-1
reference_type
scores
url https://usn.ubuntu.com/6903-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-6604
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t52p-7rr7-57ax
42
url VCID-tegn-2y58-t3de
vulnerability_id VCID-tegn-2y58-t3de
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7521.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7521.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7521
reference_id
reference_type
scores
0
value 0.00261
scoring_system epss
scoring_elements 0.49475
published_at 2026-04-18T12:55:00Z
1
value 0.00261
scoring_system epss
scoring_elements 0.49411
published_at 2026-04-02T12:55:00Z
2
value 0.00261
scoring_system epss
scoring_elements 0.49477
published_at 2026-04-16T12:55:00Z
3
value 0.00261
scoring_system epss
scoring_elements 0.49431
published_at 2026-04-13T12:55:00Z
4
value 0.00261
scoring_system epss
scoring_elements 0.49391
published_at 2026-04-07T12:55:00Z
5
value 0.00261
scoring_system epss
scoring_elements 0.49445
published_at 2026-04-08T12:55:00Z
6
value 0.00261
scoring_system epss
scoring_elements 0.49437
published_at 2026-04-04T12:55:00Z
7
value 0.00261
scoring_system epss
scoring_elements 0.49429
published_at 2026-04-12T12:55:00Z
8
value 0.00261
scoring_system epss
scoring_elements 0.49458
published_at 2026-04-11T12:55:00Z
9
value 0.00261
scoring_system epss
scoring_elements 0.49441
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7521
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303138
reference_id 2303138
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303138
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
reference_id mfsa2024-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
25
reference_url https://www.mozilla.org/security/advisories/mfsa2024-38/
reference_id mfsa2024-38
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-38/
26
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
27
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
28
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
29
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
30
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
31
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
32
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
33
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
34
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
35
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
36
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
37
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
38
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
39
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
40
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
41
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
42
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
43
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1904644
reference_id show_bug.cgi?id=1904644
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1904644
44
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
45
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-7521
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tegn-2y58-t3de
43
url VCID-ux24-3d83-23c6
vulnerability_id VCID-ux24-3d83-23c6
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8381.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8381.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8381
reference_id
reference_type
scores
0
value 0.11622
scoring_system epss
scoring_elements 0.93646
published_at 2026-04-08T12:55:00Z
1
value 0.11622
scoring_system epss
scoring_elements 0.93648
published_at 2026-04-09T12:55:00Z
2
value 0.11622
scoring_system epss
scoring_elements 0.93679
published_at 2026-04-18T12:55:00Z
3
value 0.11622
scoring_system epss
scoring_elements 0.93654
published_at 2026-04-13T12:55:00Z
4
value 0.11622
scoring_system epss
scoring_elements 0.93672
published_at 2026-04-16T12:55:00Z
5
value 0.11622
scoring_system epss
scoring_elements 0.93653
published_at 2026-04-12T12:55:00Z
6
value 0.12468
scoring_system epss
scoring_elements 0.93882
published_at 2026-04-02T12:55:00Z
7
value 0.12468
scoring_system epss
scoring_elements 0.93895
published_at 2026-04-07T12:55:00Z
8
value 0.12468
scoring_system epss
scoring_elements 0.93891
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8381
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8381
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2309427
reference_id 2309427
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2309427
5
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
6
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
7
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
reference_id mfsa2024-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-39/
reference_id mfsa2024-39
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/
url https://www.mozilla.org/security/advisories/mfsa2024-39/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
reference_id mfsa2024-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-40/
reference_id mfsa2024-40
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/
url https://www.mozilla.org/security/advisories/mfsa2024-40/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-41
reference_id mfsa2024-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-41
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-41/
reference_id mfsa2024-41
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/
url https://www.mozilla.org/security/advisories/mfsa2024-41/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
reference_id mfsa2024-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-43/
reference_id mfsa2024-43
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/
url https://www.mozilla.org/security/advisories/mfsa2024-43/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-44
reference_id mfsa2024-44
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-44
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-44/
reference_id mfsa2024-44
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/
url https://www.mozilla.org/security/advisories/mfsa2024-44/
18
reference_url https://access.redhat.com/errata/RHSA-2024:6681
reference_id RHSA-2024:6681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6681
19
reference_url https://access.redhat.com/errata/RHSA-2024:6682
reference_id RHSA-2024:6682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6682
20
reference_url https://access.redhat.com/errata/RHSA-2024:6683
reference_id RHSA-2024:6683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6683
21
reference_url https://access.redhat.com/errata/RHSA-2024:6684
reference_id RHSA-2024:6684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6684
22
reference_url https://access.redhat.com/errata/RHSA-2024:6719
reference_id RHSA-2024:6719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6719
23
reference_url https://access.redhat.com/errata/RHSA-2024:6720
reference_id RHSA-2024:6720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6720
24
reference_url https://access.redhat.com/errata/RHSA-2024:6721
reference_id RHSA-2024:6721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6721
25
reference_url https://access.redhat.com/errata/RHSA-2024:6722
reference_id RHSA-2024:6722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6722
26
reference_url https://access.redhat.com/errata/RHSA-2024:6723
reference_id RHSA-2024:6723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6723
27
reference_url https://access.redhat.com/errata/RHSA-2024:6782
reference_id RHSA-2024:6782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6782
28
reference_url https://access.redhat.com/errata/RHSA-2024:6786
reference_id RHSA-2024:6786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6786
29
reference_url https://access.redhat.com/errata/RHSA-2024:6816
reference_id RHSA-2024:6816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6816
30
reference_url https://access.redhat.com/errata/RHSA-2024:6838
reference_id RHSA-2024:6838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6838
31
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
32
reference_url https://access.redhat.com/errata/RHSA-2024:6850
reference_id RHSA-2024:6850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6850
33
reference_url https://access.redhat.com/errata/RHSA-2024:6891
reference_id RHSA-2024:6891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6891
34
reference_url https://access.redhat.com/errata/RHSA-2024:6892
reference_id RHSA-2024:6892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6892
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1912715
reference_id show_bug.cgi?id=1912715
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1912715
36
reference_url https://usn.ubuntu.com/6992-1/
reference_id USN-6992-1
reference_type
scores
url https://usn.ubuntu.com/6992-1/
37
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-8381
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ux24-3d83-23c6
44
url VCID-vdpy-f9d9-pfac
vulnerability_id VCID-vdpy-f9d9-pfac
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10467.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10467.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10467
reference_id
reference_type
scores
0
value 0.00533
scoring_system epss
scoring_elements 0.67368
published_at 2026-04-18T12:55:00Z
1
value 0.00533
scoring_system epss
scoring_elements 0.67321
published_at 2026-04-13T12:55:00Z
2
value 0.00533
scoring_system epss
scoring_elements 0.67356
published_at 2026-04-16T12:55:00Z
3
value 0.00533
scoring_system epss
scoring_elements 0.67369
published_at 2026-04-11T12:55:00Z
4
value 0.00533
scoring_system epss
scoring_elements 0.67348
published_at 2026-04-09T12:55:00Z
5
value 0.00533
scoring_system epss
scoring_elements 0.67282
published_at 2026-04-02T12:55:00Z
6
value 0.00533
scoring_system epss
scoring_elements 0.67334
published_at 2026-04-08T12:55:00Z
7
value 0.00533
scoring_system epss
scoring_elements 0.67283
published_at 2026-04-07T12:55:00Z
8
value 0.00533
scoring_system epss
scoring_elements 0.67305
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10467
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10467
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322433
reference_id 2322433
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322433
5
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1829029%2C1888538%2C1900394%2C1904059%2C1917742%2C1919809%2C1923706
reference_id buglist.cgi?bug_id=1829029%2C1888538%2C1900394%2C1904059%2C1917742%2C1919809%2C1923706
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:23:47Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1829029%2C1888538%2C1900394%2C1904059%2C1917742%2C1919809%2C1923706
6
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
7
reference_url https://security.gentoo.org/glsa/202501-10
reference_id GLSA-202501-10
reference_type
scores
url https://security.gentoo.org/glsa/202501-10
8
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
reference_id mfsa2024-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-55
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-55/
reference_id mfsa2024-55
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:23:47Z/
url https://www.mozilla.org/security/advisories/mfsa2024-55/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
reference_id mfsa2024-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-56
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-56/
reference_id mfsa2024-56
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:23:47Z/
url https://www.mozilla.org/security/advisories/mfsa2024-56/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
reference_id mfsa2024-58
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-58
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-58/
reference_id mfsa2024-58
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:23:47Z/
url https://www.mozilla.org/security/advisories/mfsa2024-58/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
reference_id mfsa2024-59
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-59
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-59/
reference_id mfsa2024-59
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T14:23:47Z/
url https://www.mozilla.org/security/advisories/mfsa2024-59/
17
reference_url https://access.redhat.com/errata/RHSA-2024:8720
reference_id RHSA-2024:8720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8720
18
reference_url https://access.redhat.com/errata/RHSA-2024:8721
reference_id RHSA-2024:8721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8721
19
reference_url https://access.redhat.com/errata/RHSA-2024:8722
reference_id RHSA-2024:8722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8722
20
reference_url https://access.redhat.com/errata/RHSA-2024:8723
reference_id RHSA-2024:8723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8723
21
reference_url https://access.redhat.com/errata/RHSA-2024:8724
reference_id RHSA-2024:8724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8724
22
reference_url https://access.redhat.com/errata/RHSA-2024:8725
reference_id RHSA-2024:8725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8725
23
reference_url https://access.redhat.com/errata/RHSA-2024:8726
reference_id RHSA-2024:8726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8726
24
reference_url https://access.redhat.com/errata/RHSA-2024:8727
reference_id RHSA-2024:8727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8727
25
reference_url https://access.redhat.com/errata/RHSA-2024:8728
reference_id RHSA-2024:8728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8728
26
reference_url https://access.redhat.com/errata/RHSA-2024:8729
reference_id RHSA-2024:8729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8729
27
reference_url https://access.redhat.com/errata/RHSA-2024:8790
reference_id RHSA-2024:8790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8790
28
reference_url https://access.redhat.com/errata/RHSA-2024:8793
reference_id RHSA-2024:8793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8793
29
reference_url https://access.redhat.com/errata/RHSA-2024:9015
reference_id RHSA-2024:9015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9015
30
reference_url https://access.redhat.com/errata/RHSA-2024:9016
reference_id RHSA-2024:9016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9016
31
reference_url https://access.redhat.com/errata/RHSA-2024:9017
reference_id RHSA-2024:9017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9017
32
reference_url https://access.redhat.com/errata/RHSA-2024:9018
reference_id RHSA-2024:9018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9018
33
reference_url https://access.redhat.com/errata/RHSA-2024:9019
reference_id RHSA-2024:9019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9019
34
reference_url https://access.redhat.com/errata/RHSA-2024:9552
reference_id RHSA-2024:9552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9552
35
reference_url https://access.redhat.com/errata/RHSA-2024:9554
reference_id RHSA-2024:9554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9554
36
reference_url https://usn.ubuntu.com/7086-1/
reference_id USN-7086-1
reference_type
scores
url https://usn.ubuntu.com/7086-1/
37
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-10467
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vdpy-f9d9-pfac
45
url VCID-w794-gqex-83du
vulnerability_id VCID-w794-gqex-83du
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6602.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6602.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6602
reference_id
reference_type
scores
0
value 0.00768
scoring_system epss
scoring_elements 0.73541
published_at 2026-04-18T12:55:00Z
1
value 0.00768
scoring_system epss
scoring_elements 0.73532
published_at 2026-04-16T12:55:00Z
2
value 0.00768
scoring_system epss
scoring_elements 0.73448
published_at 2026-04-02T12:55:00Z
3
value 0.00768
scoring_system epss
scoring_elements 0.7349
published_at 2026-04-13T12:55:00Z
4
value 0.00768
scoring_system epss
scoring_elements 0.73497
published_at 2026-04-12T12:55:00Z
5
value 0.00768
scoring_system epss
scoring_elements 0.73471
published_at 2026-04-04T12:55:00Z
6
value 0.00768
scoring_system epss
scoring_elements 0.73443
published_at 2026-04-07T12:55:00Z
7
value 0.00768
scoring_system epss
scoring_elements 0.73517
published_at 2026-04-11T12:55:00Z
8
value 0.00768
scoring_system epss
scoring_elements 0.7348
published_at 2026-04-08T12:55:00Z
9
value 0.00768
scoring_system epss
scoring_elements 0.73493
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6602
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2296637
reference_id 2296637
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2296637
9
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
10
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
11
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
reference_id mfsa2024-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-29/
reference_id mfsa2024-29
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-29/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-30
reference_id mfsa2024-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-30
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-30/
reference_id mfsa2024-30
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-30/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-31
reference_id mfsa2024-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-31
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-31/
reference_id mfsa2024-31
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-31/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
reference_id mfsa2024-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-32/
reference_id mfsa2024-32
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-32/
20
reference_url https://access.redhat.com/errata/RHSA-2024:4625
reference_id RHSA-2024:4625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4625
21
reference_url https://access.redhat.com/errata/RHSA-2024:4670
reference_id RHSA-2024:4670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4670
22
reference_url https://access.redhat.com/errata/RHSA-2024:4671
reference_id RHSA-2024:4671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4671
23
reference_url https://access.redhat.com/errata/RHSA-2024:4717
reference_id RHSA-2024:4717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4717
24
reference_url https://access.redhat.com/errata/RHSA-2024:4718
reference_id RHSA-2024:4718
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4718
25
reference_url https://access.redhat.com/errata/RHSA-2024:4894
reference_id RHSA-2024:4894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4894
26
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
27
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1895032
reference_id show_bug.cgi?id=1895032
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1895032
28
reference_url https://usn.ubuntu.com/6890-1/
reference_id USN-6890-1
reference_type
scores
url https://usn.ubuntu.com/6890-1/
29
reference_url https://usn.ubuntu.com/6903-1/
reference_id USN-6903-1
reference_type
scores
url https://usn.ubuntu.com/6903-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-6602
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w794-gqex-83du
46
url VCID-xevc-xbcg-1yct
vulnerability_id VCID-xevc-xbcg-1yct
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7526.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7526.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7526
reference_id
reference_type
scores
0
value 0.00272
scoring_system epss
scoring_elements 0.50681
published_at 2026-04-18T12:55:00Z
1
value 0.00272
scoring_system epss
scoring_elements 0.50598
published_at 2026-04-02T12:55:00Z
2
value 0.00272
scoring_system epss
scoring_elements 0.50675
published_at 2026-04-16T12:55:00Z
3
value 0.00272
scoring_system epss
scoring_elements 0.50634
published_at 2026-04-13T12:55:00Z
4
value 0.00272
scoring_system epss
scoring_elements 0.50578
published_at 2026-04-07T12:55:00Z
5
value 0.00272
scoring_system epss
scoring_elements 0.50632
published_at 2026-04-08T12:55:00Z
6
value 0.00272
scoring_system epss
scoring_elements 0.50626
published_at 2026-04-04T12:55:00Z
7
value 0.00272
scoring_system epss
scoring_elements 0.50648
published_at 2026-04-12T12:55:00Z
8
value 0.00272
scoring_system epss
scoring_elements 0.50671
published_at 2026-04-11T12:55:00Z
9
value 0.00272
scoring_system epss
scoring_elements 0.50629
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7526
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303143
reference_id 2303143
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303143
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
reference_id mfsa2024-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
25
reference_url https://www.mozilla.org/security/advisories/mfsa2024-38/
reference_id mfsa2024-38
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-38/
26
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
27
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
28
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
29
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
30
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
31
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
32
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
33
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
34
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
35
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
36
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
37
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
38
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
39
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
40
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
41
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
42
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
43
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1910306
reference_id show_bug.cgi?id=1910306
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1910306
44
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
45
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-7526
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xevc-xbcg-1yct
47
url VCID-xyqa-esey-73e1
vulnerability_id VCID-xyqa-esey-73e1
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7525.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7525.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7525
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33449
published_at 2026-04-18T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.33549
published_at 2026-04-02T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33474
published_at 2026-04-16T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33437
published_at 2026-04-13T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33421
published_at 2026-04-07T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.33465
published_at 2026-04-08T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.33582
published_at 2026-04-04T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33461
published_at 2026-04-12T12:55:00Z
8
value 0.00137
scoring_system epss
scoring_elements 0.33502
published_at 2026-04-11T12:55:00Z
9
value 0.00137
scoring_system epss
scoring_elements 0.33499
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7525
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303142
reference_id 2303142
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303142
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
reference_id mfsa2024-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
25
reference_url https://www.mozilla.org/security/advisories/mfsa2024-38/
reference_id mfsa2024-38
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-38/
26
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
27
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
28
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
29
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
30
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
31
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
32
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
33
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
34
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
35
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
36
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
37
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
38
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
39
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
40
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
41
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
42
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
43
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1909298
reference_id show_bug.cgi?id=1909298
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1909298
44
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
45
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-7525
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xyqa-esey-73e1
48
url VCID-z6kw-szww-7feq
vulnerability_id VCID-z6kw-szww-7feq
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7529.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7529.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7529
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.3183
published_at 2026-04-18T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.31947
published_at 2026-04-02T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.31849
published_at 2026-04-16T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.31818
published_at 2026-04-13T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31808
published_at 2026-04-07T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31861
published_at 2026-04-08T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31988
published_at 2026-04-04T12:55:00Z
7
value 0.00126
scoring_system epss
scoring_elements 0.31853
published_at 2026-04-12T12:55:00Z
8
value 0.00126
scoring_system epss
scoring_elements 0.31892
published_at 2026-04-11T12:55:00Z
9
value 0.00126
scoring_system epss
scoring_elements 0.31889
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7529
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303146
reference_id 2303146
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303146
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
reference_id mfsa2024-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
25
reference_url https://www.mozilla.org/security/advisories/mfsa2024-38/
reference_id mfsa2024-38
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-38/
26
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
27
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
28
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
29
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
30
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
31
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
32
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
33
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
34
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
35
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
36
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
37
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
38
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
39
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
40
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
41
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
42
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
43
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1903187
reference_id show_bug.cgi?id=1903187
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1903187
44
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
45
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-7529
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z6kw-szww-7feq
49
url VCID-z6yt-va55-s3ey
vulnerability_id VCID-z6yt-va55-s3ey
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9401.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9401.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9401
reference_id
reference_type
scores
0
value 0.00183
scoring_system epss
scoring_elements 0.40038
published_at 2026-04-18T12:55:00Z
1
value 0.00183
scoring_system epss
scoring_elements 0.40067
published_at 2026-04-16T12:55:00Z
2
value 0.00183
scoring_system epss
scoring_elements 0.40018
published_at 2026-04-13T12:55:00Z
3
value 0.00183
scoring_system epss
scoring_elements 0.40037
published_at 2026-04-12T12:55:00Z
4
value 0.00183
scoring_system epss
scoring_elements 0.40074
published_at 2026-04-11T12:55:00Z
5
value 0.00183
scoring_system epss
scoring_elements 0.40063
published_at 2026-04-09T12:55:00Z
6
value 0.00183
scoring_system epss
scoring_elements 0.40049
published_at 2026-04-08T12:55:00Z
7
value 0.00183
scoring_system epss
scoring_elements 0.39996
published_at 2026-04-07T12:55:00Z
8
value 0.00183
scoring_system epss
scoring_elements 0.40075
published_at 2026-04-04T12:55:00Z
9
value 0.00183
scoring_system epss
scoring_elements 0.40048
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9401
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9401
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9401
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315950
reference_id 2315950
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315950
5
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1916476
reference_id buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1916476
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1916476
6
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
7
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
8
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
reference_id mfsa2024-48
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-48/
reference_id mfsa2024-48
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-48/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
18
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
19
reference_url https://access.redhat.com/errata/RHSA-2024:7505
reference_id RHSA-2024:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7505
20
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
21
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
22
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
23
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
24
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
25
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
26
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
27
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
28
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
29
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
30
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
31
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
32
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
33
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
34
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
35
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
36
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-9401
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z6yt-va55-s3ey
50
url VCID-zveb-b3t7-7yfg
vulnerability_id VCID-zveb-b3t7-7yfg
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7528.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7528.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7528
reference_id
reference_type
scores
0
value 0.00238
scoring_system epss
scoring_elements 0.46917
published_at 2026-04-18T12:55:00Z
1
value 0.00238
scoring_system epss
scoring_elements 0.4692
published_at 2026-04-16T12:55:00Z
2
value 0.00238
scoring_system epss
scoring_elements 0.46865
published_at 2026-04-13T12:55:00Z
3
value 0.00238
scoring_system epss
scoring_elements 0.46857
published_at 2026-04-12T12:55:00Z
4
value 0.00238
scoring_system epss
scoring_elements 0.46884
published_at 2026-04-11T12:55:00Z
5
value 0.00238
scoring_system epss
scoring_elements 0.46859
published_at 2026-04-04T12:55:00Z
6
value 0.00238
scoring_system epss
scoring_elements 0.46862
published_at 2026-04-08T12:55:00Z
7
value 0.00238
scoring_system epss
scoring_elements 0.46808
published_at 2026-04-07T12:55:00Z
8
value 0.00238
scoring_system epss
scoring_elements 0.46841
published_at 2026-04-02T12:55:00Z
9
value 0.00238
scoring_system epss
scoring_elements 0.46861
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7528
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303145
reference_id 2303145
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303145
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:09:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:09:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:09:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
13
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
14
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
15
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
16
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
17
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
18
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
19
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
20
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
21
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
22
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
23
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
24
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
25
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
26
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
27
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
28
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
29
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
30
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1895951
reference_id show_bug.cgi?id=1895951
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:09:03Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1895951
31
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird@128.4.0
purl pkg:ebuild/mail-client/thunderbird@128.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0
aliases CVE-2024-7528
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zveb-b3t7-7yfg
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@128.4.0