Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-lang/spidermonkey@115.15.0
Typeebuild
Namespacedev-lang
Namespidermonkey
Version115.15.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version128.8.0
Latest_non_vulnerable_version128.9.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2cuh-xyst-rbgv
vulnerability_id VCID-2cuh-xyst-rbgv
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7518.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7518.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7518
reference_id
reference_type
scores
0
value 0.00318
scoring_system epss
scoring_elements 0.54899
published_at 2026-04-18T12:55:00Z
1
value 0.00318
scoring_system epss
scoring_elements 0.54897
published_at 2026-04-16T12:55:00Z
2
value 0.00318
scoring_system epss
scoring_elements 0.54848
published_at 2026-04-02T12:55:00Z
3
value 0.00318
scoring_system epss
scoring_elements 0.54891
published_at 2026-04-08T12:55:00Z
4
value 0.00318
scoring_system epss
scoring_elements 0.54841
published_at 2026-04-07T12:55:00Z
5
value 0.00318
scoring_system epss
scoring_elements 0.54872
published_at 2026-04-04T12:55:00Z
6
value 0.00318
scoring_system epss
scoring_elements 0.54859
published_at 2026-04-13T12:55:00Z
7
value 0.00318
scoring_system epss
scoring_elements 0.54883
published_at 2026-04-12T12:55:00Z
8
value 0.00318
scoring_system epss
scoring_elements 0.549
published_at 2026-04-11T12:55:00Z
9
value 0.00318
scoring_system epss
scoring_elements 0.54888
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7518
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303135
reference_id 2303135
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303135
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T17:58:37Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T17:58:37Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T17:58:37Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
13
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
14
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
15
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
16
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
17
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
18
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
19
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
20
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
21
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
22
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
23
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
24
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
25
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
26
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
27
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
28
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
29
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
30
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1875354
reference_id show_bug.cgi?id=1875354
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T17:58:37Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1875354
31
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-7518
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2cuh-xyst-rbgv
1
url VCID-2pvz-3cmq-53dk
vulnerability_id VCID-2pvz-3cmq-53dk
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7519.json
reference_id
reference_type
scores
0
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7519.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7519
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58829
published_at 2026-04-18T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.58763
published_at 2026-04-02T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.58825
published_at 2026-04-16T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.58793
published_at 2026-04-13T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58805
published_at 2026-04-08T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.58753
published_at 2026-04-07T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.58784
published_at 2026-04-04T12:55:00Z
7
value 0.00369
scoring_system epss
scoring_elements 0.5883
published_at 2026-04-11T12:55:00Z
8
value 0.00369
scoring_system epss
scoring_elements 0.58812
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7519
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303136
reference_id 2303136
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303136
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
reference_id mfsa2024-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
25
reference_url https://www.mozilla.org/security/advisories/mfsa2024-38/
reference_id mfsa2024-38
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/
url https://www.mozilla.org/security/advisories/mfsa2024-38/
26
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
27
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
28
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
29
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
30
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
31
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
32
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
33
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
34
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
35
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
36
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
37
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
38
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
39
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
40
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
41
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
42
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
43
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1902307
reference_id show_bug.cgi?id=1902307
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1902307
44
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
45
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-7519
risk_score 4.3
exploitability 0.5
weighted_severity 8.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2pvz-3cmq-53dk
2
url VCID-3ayf-d2s1-67ff
vulnerability_id VCID-3ayf-d2s1-67ff
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8382.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8382.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8382
reference_id
reference_type
scores
0
value 0.00242
scoring_system epss
scoring_elements 0.47431
published_at 2026-04-02T12:55:00Z
1
value 0.00242
scoring_system epss
scoring_elements 0.47517
published_at 2026-04-16T12:55:00Z
2
value 0.00242
scoring_system epss
scoring_elements 0.47457
published_at 2026-04-13T12:55:00Z
3
value 0.00242
scoring_system epss
scoring_elements 0.47451
published_at 2026-04-12T12:55:00Z
4
value 0.00242
scoring_system epss
scoring_elements 0.47476
published_at 2026-04-11T12:55:00Z
5
value 0.00242
scoring_system epss
scoring_elements 0.47456
published_at 2026-04-08T12:55:00Z
6
value 0.00242
scoring_system epss
scoring_elements 0.47401
published_at 2026-04-07T12:55:00Z
7
value 0.00242
scoring_system epss
scoring_elements 0.47452
published_at 2026-04-09T12:55:00Z
8
value 0.00242
scoring_system epss
scoring_elements 0.47509
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8382
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8382
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2309428
reference_id 2309428
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2309428
5
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
6
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
7
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
reference_id mfsa2024-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-39/
reference_id mfsa2024-39
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/
url https://www.mozilla.org/security/advisories/mfsa2024-39/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
reference_id mfsa2024-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-40/
reference_id mfsa2024-40
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/
url https://www.mozilla.org/security/advisories/mfsa2024-40/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-41
reference_id mfsa2024-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-41
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-41/
reference_id mfsa2024-41
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/
url https://www.mozilla.org/security/advisories/mfsa2024-41/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
reference_id mfsa2024-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-43/
reference_id mfsa2024-43
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/
url https://www.mozilla.org/security/advisories/mfsa2024-43/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-44
reference_id mfsa2024-44
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-44
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-44/
reference_id mfsa2024-44
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/
url https://www.mozilla.org/security/advisories/mfsa2024-44/
18
reference_url https://access.redhat.com/errata/RHSA-2024:6681
reference_id RHSA-2024:6681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6681
19
reference_url https://access.redhat.com/errata/RHSA-2024:6682
reference_id RHSA-2024:6682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6682
20
reference_url https://access.redhat.com/errata/RHSA-2024:6683
reference_id RHSA-2024:6683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6683
21
reference_url https://access.redhat.com/errata/RHSA-2024:6684
reference_id RHSA-2024:6684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6684
22
reference_url https://access.redhat.com/errata/RHSA-2024:6719
reference_id RHSA-2024:6719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6719
23
reference_url https://access.redhat.com/errata/RHSA-2024:6720
reference_id RHSA-2024:6720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6720
24
reference_url https://access.redhat.com/errata/RHSA-2024:6721
reference_id RHSA-2024:6721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6721
25
reference_url https://access.redhat.com/errata/RHSA-2024:6722
reference_id RHSA-2024:6722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6722
26
reference_url https://access.redhat.com/errata/RHSA-2024:6723
reference_id RHSA-2024:6723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6723
27
reference_url https://access.redhat.com/errata/RHSA-2024:6782
reference_id RHSA-2024:6782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6782
28
reference_url https://access.redhat.com/errata/RHSA-2024:6786
reference_id RHSA-2024:6786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6786
29
reference_url https://access.redhat.com/errata/RHSA-2024:6816
reference_id RHSA-2024:6816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6816
30
reference_url https://access.redhat.com/errata/RHSA-2024:6838
reference_id RHSA-2024:6838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6838
31
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
32
reference_url https://access.redhat.com/errata/RHSA-2024:6850
reference_id RHSA-2024:6850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6850
33
reference_url https://access.redhat.com/errata/RHSA-2024:6891
reference_id RHSA-2024:6891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6891
34
reference_url https://access.redhat.com/errata/RHSA-2024:6892
reference_id RHSA-2024:6892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6892
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1906744
reference_id show_bug.cgi?id=1906744
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1906744
36
reference_url https://usn.ubuntu.com/6992-1/
reference_id USN-6992-1
reference_type
scores
url https://usn.ubuntu.com/6992-1/
37
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-8382
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ayf-d2s1-67ff
3
url VCID-3sjh-f264-m3g7
vulnerability_id VCID-3sjh-f264-m3g7
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8387.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8387.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8387
reference_id
reference_type
scores
0
value 0.00543
scoring_system epss
scoring_elements 0.67746
published_at 2026-04-16T12:55:00Z
1
value 0.00543
scoring_system epss
scoring_elements 0.67688
published_at 2026-04-04T12:55:00Z
2
value 0.00543
scoring_system epss
scoring_elements 0.67735
published_at 2026-04-09T12:55:00Z
3
value 0.00543
scoring_system epss
scoring_elements 0.6772
published_at 2026-04-08T12:55:00Z
4
value 0.00543
scoring_system epss
scoring_elements 0.67669
published_at 2026-04-07T12:55:00Z
5
value 0.00543
scoring_system epss
scoring_elements 0.67668
published_at 2026-04-02T12:55:00Z
6
value 0.00543
scoring_system epss
scoring_elements 0.6771
published_at 2026-04-13T12:55:00Z
7
value 0.00543
scoring_system epss
scoring_elements 0.67744
published_at 2026-04-12T12:55:00Z
8
value 0.00543
scoring_system epss
scoring_elements 0.67759
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8387
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2309433
reference_id 2309433
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2309433
4
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1857607%2C1911858%2C1914009
reference_id buglist.cgi?bug_id=1857607%2C1911858%2C1914009
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:41:12Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1857607%2C1911858%2C1914009
5
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
6
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
7
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
reference_id mfsa2024-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-39/
reference_id mfsa2024-39
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:41:12Z/
url https://www.mozilla.org/security/advisories/mfsa2024-39/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
reference_id mfsa2024-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-40/
reference_id mfsa2024-40
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:41:12Z/
url https://www.mozilla.org/security/advisories/mfsa2024-40/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
reference_id mfsa2024-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-43/
reference_id mfsa2024-43
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:41:12Z/
url https://www.mozilla.org/security/advisories/mfsa2024-43/
14
reference_url https://access.redhat.com/errata/RHSA-2024:6681
reference_id RHSA-2024:6681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6681
15
reference_url https://access.redhat.com/errata/RHSA-2024:6682
reference_id RHSA-2024:6682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6682
16
reference_url https://access.redhat.com/errata/RHSA-2024:6683
reference_id RHSA-2024:6683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6683
17
reference_url https://access.redhat.com/errata/RHSA-2024:6684
reference_id RHSA-2024:6684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6684
18
reference_url https://access.redhat.com/errata/RHSA-2024:6719
reference_id RHSA-2024:6719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6719
19
reference_url https://access.redhat.com/errata/RHSA-2024:6720
reference_id RHSA-2024:6720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6720
20
reference_url https://access.redhat.com/errata/RHSA-2024:6721
reference_id RHSA-2024:6721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6721
21
reference_url https://access.redhat.com/errata/RHSA-2024:6722
reference_id RHSA-2024:6722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6722
22
reference_url https://access.redhat.com/errata/RHSA-2024:6723
reference_id RHSA-2024:6723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6723
23
reference_url https://access.redhat.com/errata/RHSA-2024:6782
reference_id RHSA-2024:6782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6782
24
reference_url https://access.redhat.com/errata/RHSA-2024:6786
reference_id RHSA-2024:6786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6786
25
reference_url https://access.redhat.com/errata/RHSA-2024:6816
reference_id RHSA-2024:6816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6816
26
reference_url https://access.redhat.com/errata/RHSA-2024:6838
reference_id RHSA-2024:6838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6838
27
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
28
reference_url https://access.redhat.com/errata/RHSA-2024:6850
reference_id RHSA-2024:6850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6850
29
reference_url https://access.redhat.com/errata/RHSA-2024:6891
reference_id RHSA-2024:6891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6891
30
reference_url https://access.redhat.com/errata/RHSA-2024:6892
reference_id RHSA-2024:6892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6892
31
reference_url https://usn.ubuntu.com/6992-1/
reference_id USN-6992-1
reference_type
scores
url https://usn.ubuntu.com/6992-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-8387
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3sjh-f264-m3g7
4
url VCID-4jfr-pz41-gfbz
vulnerability_id VCID-4jfr-pz41-gfbz
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7523
reference_id
reference_type
scores
0
value 0.00115
scoring_system epss
scoring_elements 0.30147
published_at 2026-04-18T12:55:00Z
1
value 0.00115
scoring_system epss
scoring_elements 0.30203
published_at 2026-04-08T12:55:00Z
2
value 0.00115
scoring_system epss
scoring_elements 0.30238
published_at 2026-04-09T12:55:00Z
3
value 0.00115
scoring_system epss
scoring_elements 0.30241
published_at 2026-04-11T12:55:00Z
4
value 0.00115
scoring_system epss
scoring_elements 0.30198
published_at 2026-04-12T12:55:00Z
5
value 0.00115
scoring_system epss
scoring_elements 0.30151
published_at 2026-04-13T12:55:00Z
6
value 0.00115
scoring_system epss
scoring_elements 0.30166
published_at 2026-04-16T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30279
published_at 2026-04-02T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30329
published_at 2026-04-04T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.30143
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7523
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
3
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
4
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
6
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:41:10Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1908344
reference_id show_bug.cgi?id=1908344
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:41:10Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1908344
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-7523
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4jfr-pz41-gfbz
5
url VCID-62zr-8w1c-bydt
vulnerability_id VCID-62zr-8w1c-bydt
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8394.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8394.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8394
reference_id
reference_type
scores
0
value 0.00363
scoring_system epss
scoring_elements 0.58426
published_at 2026-04-18T12:55:00Z
1
value 0.00363
scoring_system epss
scoring_elements 0.58412
published_at 2026-04-09T12:55:00Z
2
value 0.00363
scoring_system epss
scoring_elements 0.58429
published_at 2026-04-11T12:55:00Z
3
value 0.00363
scoring_system epss
scoring_elements 0.58408
published_at 2026-04-12T12:55:00Z
4
value 0.00363
scoring_system epss
scoring_elements 0.58389
published_at 2026-04-13T12:55:00Z
5
value 0.00363
scoring_system epss
scoring_elements 0.58422
published_at 2026-04-16T12:55:00Z
6
value 0.00363
scoring_system epss
scoring_elements 0.58359
published_at 2026-04-02T12:55:00Z
7
value 0.00363
scoring_system epss
scoring_elements 0.58379
published_at 2026-04-04T12:55:00Z
8
value 0.00363
scoring_system epss
scoring_elements 0.58353
published_at 2026-04-07T12:55:00Z
9
value 0.00363
scoring_system epss
scoring_elements 0.58406
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8394
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2310481
reference_id 2310481
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2310481
3
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
4
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
5
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
reference_id mfsa2024-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
7
reference_url https://www.mozilla.org/security/advisories/mfsa2024-43/
reference_id mfsa2024-43
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-06T19:38:19Z/
url https://www.mozilla.org/security/advisories/mfsa2024-43/
8
reference_url https://access.redhat.com/errata/RHSA-2024:6683
reference_id RHSA-2024:6683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6683
9
reference_url https://access.redhat.com/errata/RHSA-2024:6684
reference_id RHSA-2024:6684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6684
10
reference_url https://access.redhat.com/errata/RHSA-2024:6719
reference_id RHSA-2024:6719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6719
11
reference_url https://access.redhat.com/errata/RHSA-2024:6720
reference_id RHSA-2024:6720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6720
12
reference_url https://access.redhat.com/errata/RHSA-2024:6721
reference_id RHSA-2024:6721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6721
13
reference_url https://access.redhat.com/errata/RHSA-2024:6722
reference_id RHSA-2024:6722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6722
14
reference_url https://access.redhat.com/errata/RHSA-2024:6723
reference_id RHSA-2024:6723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6723
15
reference_url https://access.redhat.com/errata/RHSA-2024:6816
reference_id RHSA-2024:6816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6816
16
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1895737
reference_id show_bug.cgi?id=1895737
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-06T19:38:19Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1895737
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-8394
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-62zr-8w1c-bydt
6
url VCID-957q-jagj-9kg7
vulnerability_id VCID-957q-jagj-9kg7
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7527.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7527.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7527
reference_id
reference_type
scores
0
value 0.00239
scoring_system epss
scoring_elements 0.47055
published_at 2026-04-18T12:55:00Z
1
value 0.00239
scoring_system epss
scoring_elements 0.47059
published_at 2026-04-16T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.47003
published_at 2026-04-13T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.46981
published_at 2026-04-02T12:55:00Z
4
value 0.00239
scoring_system epss
scoring_elements 0.46998
published_at 2026-04-09T12:55:00Z
5
value 0.00239
scoring_system epss
scoring_elements 0.47001
published_at 2026-04-08T12:55:00Z
6
value 0.00239
scoring_system epss
scoring_elements 0.46947
published_at 2026-04-07T12:55:00Z
7
value 0.00239
scoring_system epss
scoring_elements 0.46999
published_at 2026-04-04T12:55:00Z
8
value 0.00239
scoring_system epss
scoring_elements 0.46996
published_at 2026-04-12T12:55:00Z
9
value 0.00239
scoring_system epss
scoring_elements 0.47023
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7527
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303144
reference_id 2303144
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303144
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
reference_id mfsa2024-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
25
reference_url https://www.mozilla.org/security/advisories/mfsa2024-38/
reference_id mfsa2024-38
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/
url https://www.mozilla.org/security/advisories/mfsa2024-38/
26
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
27
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
28
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
29
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
30
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
31
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
32
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
33
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
34
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
35
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
36
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
37
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
38
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
39
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
40
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
41
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
42
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
43
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1871303
reference_id show_bug.cgi?id=1871303
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1871303
44
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
45
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-7527
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-957q-jagj-9kg7
7
url VCID-b9aw-u5wp-6uhk
vulnerability_id VCID-b9aw-u5wp-6uhk
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5693.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5693.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-5693
reference_id
reference_type
scores
0
value 0.0147
scoring_system epss
scoring_elements 0.80919
published_at 2026-04-08T12:55:00Z
1
value 0.0147
scoring_system epss
scoring_elements 0.80956
published_at 2026-04-16T12:55:00Z
2
value 0.0147
scoring_system epss
scoring_elements 0.80921
published_at 2026-04-13T12:55:00Z
3
value 0.0147
scoring_system epss
scoring_elements 0.8093
published_at 2026-04-12T12:55:00Z
4
value 0.0147
scoring_system epss
scoring_elements 0.80944
published_at 2026-04-11T12:55:00Z
5
value 0.0147
scoring_system epss
scoring_elements 0.80928
published_at 2026-04-09T12:55:00Z
6
value 0.0147
scoring_system epss
scoring_elements 0.80871
published_at 2026-04-02T12:55:00Z
7
value 0.0147
scoring_system epss
scoring_elements 0.80894
published_at 2026-04-04T12:55:00Z
8
value 0.0147
scoring_system epss
scoring_elements 0.80891
published_at 2026-04-07T12:55:00Z
9
value 0.0147
scoring_system epss
scoring_elements 0.80958
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-5693
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2291399
reference_id 2291399
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2291399
10
reference_url https://security.gentoo.org/glsa/202408-02
reference_id GLSA-202408-02
reference_type
scores
url https://security.gentoo.org/glsa/202408-02
11
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
12
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-25
reference_id mfsa2024-25
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-25
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-25/
reference_id mfsa2024-25
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/
url https://www.mozilla.org/security/advisories/mfsa2024-25/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-26
reference_id mfsa2024-26
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-26
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-26/
reference_id mfsa2024-26
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/
url https://www.mozilla.org/security/advisories/mfsa2024-26/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-28
reference_id mfsa2024-28
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-28
18
reference_url https://www.mozilla.org/security/advisories/mfsa2024-28/
reference_id mfsa2024-28
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/
url https://www.mozilla.org/security/advisories/mfsa2024-28/
19
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html
20
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html
21
reference_url https://access.redhat.com/errata/RHSA-2024:3949
reference_id RHSA-2024:3949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3949
22
reference_url https://access.redhat.com/errata/RHSA-2024:3950
reference_id RHSA-2024:3950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3950
23
reference_url https://access.redhat.com/errata/RHSA-2024:3951
reference_id RHSA-2024:3951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3951
24
reference_url https://access.redhat.com/errata/RHSA-2024:3952
reference_id RHSA-2024:3952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3952
25
reference_url https://access.redhat.com/errata/RHSA-2024:3953
reference_id RHSA-2024:3953
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3953
26
reference_url https://access.redhat.com/errata/RHSA-2024:3954
reference_id RHSA-2024:3954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3954
27
reference_url https://access.redhat.com/errata/RHSA-2024:3955
reference_id RHSA-2024:3955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3955
28
reference_url https://access.redhat.com/errata/RHSA-2024:3958
reference_id RHSA-2024:3958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3958
29
reference_url https://access.redhat.com/errata/RHSA-2024:3972
reference_id RHSA-2024:3972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3972
30
reference_url https://access.redhat.com/errata/RHSA-2024:4001
reference_id RHSA-2024:4001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4001
31
reference_url https://access.redhat.com/errata/RHSA-2024:4002
reference_id RHSA-2024:4002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4002
32
reference_url https://access.redhat.com/errata/RHSA-2024:4003
reference_id RHSA-2024:4003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4003
33
reference_url https://access.redhat.com/errata/RHSA-2024:4004
reference_id RHSA-2024:4004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4004
34
reference_url https://access.redhat.com/errata/RHSA-2024:4015
reference_id RHSA-2024:4015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4015
35
reference_url https://access.redhat.com/errata/RHSA-2024:4016
reference_id RHSA-2024:4016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4016
36
reference_url https://access.redhat.com/errata/RHSA-2024:4018
reference_id RHSA-2024:4018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4018
37
reference_url https://access.redhat.com/errata/RHSA-2024:4036
reference_id RHSA-2024:4036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4036
38
reference_url https://access.redhat.com/errata/RHSA-2024:4063
reference_id RHSA-2024:4063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4063
39
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1891319
reference_id show_bug.cgi?id=1891319
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1891319
40
reference_url https://usn.ubuntu.com/6840-1/
reference_id USN-6840-1
reference_type
scores
url https://usn.ubuntu.com/6840-1/
41
reference_url https://usn.ubuntu.com/6862-1/
reference_id USN-6862-1
reference_type
scores
url https://usn.ubuntu.com/6862-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-5693
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b9aw-u5wp-6uhk
8
url VCID-bshu-jxhj-27b8
vulnerability_id VCID-bshu-jxhj-27b8
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5700.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5700.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-5700
reference_id
reference_type
scores
0
value 0.0017
scoring_system epss
scoring_elements 0.38207
published_at 2026-04-08T12:55:00Z
1
value 0.0017
scoring_system epss
scoring_elements 0.3822
published_at 2026-04-16T12:55:00Z
2
value 0.0017
scoring_system epss
scoring_elements 0.38175
published_at 2026-04-13T12:55:00Z
3
value 0.0017
scoring_system epss
scoring_elements 0.38199
published_at 2026-04-12T12:55:00Z
4
value 0.0017
scoring_system epss
scoring_elements 0.38234
published_at 2026-04-11T12:55:00Z
5
value 0.0017
scoring_system epss
scoring_elements 0.38215
published_at 2026-04-09T12:55:00Z
6
value 0.0017
scoring_system epss
scoring_elements 0.38265
published_at 2026-04-02T12:55:00Z
7
value 0.0017
scoring_system epss
scoring_elements 0.38288
published_at 2026-04-04T12:55:00Z
8
value 0.0017
scoring_system epss
scoring_elements 0.38156
published_at 2026-04-07T12:55:00Z
9
value 0.0017
scoring_system epss
scoring_elements 0.38201
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-5700
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2291401
reference_id 2291401
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2291401
10
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1862809%2C1889355%2C1893388%2C1895123
reference_id buglist.cgi?bug_id=1862809%2C1889355%2C1893388%2C1895123
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1862809%2C1889355%2C1893388%2C1895123
11
reference_url https://security.gentoo.org/glsa/202408-02
reference_id GLSA-202408-02
reference_type
scores
url https://security.gentoo.org/glsa/202408-02
12
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
13
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-25
reference_id mfsa2024-25
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-25
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-25/
reference_id mfsa2024-25
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/
url https://www.mozilla.org/security/advisories/mfsa2024-25/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-26
reference_id mfsa2024-26
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-26
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-26/
reference_id mfsa2024-26
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/
url https://www.mozilla.org/security/advisories/mfsa2024-26/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-28
reference_id mfsa2024-28
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-28
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-28/
reference_id mfsa2024-28
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/
url https://www.mozilla.org/security/advisories/mfsa2024-28/
20
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html
21
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html
22
reference_url https://access.redhat.com/errata/RHSA-2024:3949
reference_id RHSA-2024:3949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3949
23
reference_url https://access.redhat.com/errata/RHSA-2024:3950
reference_id RHSA-2024:3950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3950
24
reference_url https://access.redhat.com/errata/RHSA-2024:3951
reference_id RHSA-2024:3951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3951
25
reference_url https://access.redhat.com/errata/RHSA-2024:3952
reference_id RHSA-2024:3952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3952
26
reference_url https://access.redhat.com/errata/RHSA-2024:3953
reference_id RHSA-2024:3953
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3953
27
reference_url https://access.redhat.com/errata/RHSA-2024:3954
reference_id RHSA-2024:3954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3954
28
reference_url https://access.redhat.com/errata/RHSA-2024:3955
reference_id RHSA-2024:3955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3955
29
reference_url https://access.redhat.com/errata/RHSA-2024:3958
reference_id RHSA-2024:3958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3958
30
reference_url https://access.redhat.com/errata/RHSA-2024:3972
reference_id RHSA-2024:3972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3972
31
reference_url https://access.redhat.com/errata/RHSA-2024:4001
reference_id RHSA-2024:4001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4001
32
reference_url https://access.redhat.com/errata/RHSA-2024:4002
reference_id RHSA-2024:4002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4002
33
reference_url https://access.redhat.com/errata/RHSA-2024:4003
reference_id RHSA-2024:4003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4003
34
reference_url https://access.redhat.com/errata/RHSA-2024:4004
reference_id RHSA-2024:4004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4004
35
reference_url https://access.redhat.com/errata/RHSA-2024:4015
reference_id RHSA-2024:4015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4015
36
reference_url https://access.redhat.com/errata/RHSA-2024:4016
reference_id RHSA-2024:4016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4016
37
reference_url https://access.redhat.com/errata/RHSA-2024:4018
reference_id RHSA-2024:4018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4018
38
reference_url https://access.redhat.com/errata/RHSA-2024:4036
reference_id RHSA-2024:4036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4036
39
reference_url https://access.redhat.com/errata/RHSA-2024:4063
reference_id RHSA-2024:4063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4063
40
reference_url https://usn.ubuntu.com/6840-1/
reference_id USN-6840-1
reference_type
scores
url https://usn.ubuntu.com/6840-1/
41
reference_url https://usn.ubuntu.com/6862-1/
reference_id USN-6862-1
reference_type
scores
url https://usn.ubuntu.com/6862-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-5700
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bshu-jxhj-27b8
9
url VCID-cmr4-6stm-jfe9
vulnerability_id VCID-cmr4-6stm-jfe9
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7524.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7524.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7524
reference_id
reference_type
scores
0
value 0.00297
scoring_system epss
scoring_elements 0.53093
published_at 2026-04-18T12:55:00Z
1
value 0.00297
scoring_system epss
scoring_elements 0.5302
published_at 2026-04-04T12:55:00Z
2
value 0.00297
scoring_system epss
scoring_elements 0.53032
published_at 2026-04-09T12:55:00Z
3
value 0.00297
scoring_system epss
scoring_elements 0.53038
published_at 2026-04-08T12:55:00Z
4
value 0.00297
scoring_system epss
scoring_elements 0.52996
published_at 2026-04-02T12:55:00Z
5
value 0.00297
scoring_system epss
scoring_elements 0.52987
published_at 2026-04-07T12:55:00Z
6
value 0.00297
scoring_system epss
scoring_elements 0.53086
published_at 2026-04-16T12:55:00Z
7
value 0.00297
scoring_system epss
scoring_elements 0.53049
published_at 2026-04-13T12:55:00Z
8
value 0.00297
scoring_system epss
scoring_elements 0.53066
published_at 2026-04-12T12:55:00Z
9
value 0.00297
scoring_system epss
scoring_elements 0.53081
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7524
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303141
reference_id 2303141
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303141
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T20:09:21Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T20:09:21Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T20:09:21Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
23
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
24
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
25
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
26
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
27
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
28
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
29
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
30
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
31
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1909241
reference_id show_bug.cgi?id=1909241
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T20:09:21Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1909241
32
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-7524
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cmr4-6stm-jfe9
10
url VCID-drjc-gxrt-q7ha
vulnerability_id VCID-drjc-gxrt-q7ha
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7520.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7520.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7520
reference_id
reference_type
scores
0
value 0.00655
scoring_system epss
scoring_elements 0.70986
published_at 2026-04-18T12:55:00Z
1
value 0.00655
scoring_system epss
scoring_elements 0.70978
published_at 2026-04-16T12:55:00Z
2
value 0.00655
scoring_system epss
scoring_elements 0.70932
published_at 2026-04-13T12:55:00Z
3
value 0.00655
scoring_system epss
scoring_elements 0.70948
published_at 2026-04-12T12:55:00Z
4
value 0.00655
scoring_system epss
scoring_elements 0.70964
published_at 2026-04-11T12:55:00Z
5
value 0.00655
scoring_system epss
scoring_elements 0.70907
published_at 2026-04-04T12:55:00Z
6
value 0.00655
scoring_system epss
scoring_elements 0.70926
published_at 2026-04-08T12:55:00Z
7
value 0.00655
scoring_system epss
scoring_elements 0.70882
published_at 2026-04-07T12:55:00Z
8
value 0.00655
scoring_system epss
scoring_elements 0.70889
published_at 2026-04-02T12:55:00Z
9
value 0.00655
scoring_system epss
scoring_elements 0.70941
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7520
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303137
reference_id 2303137
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303137
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:23:43Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:23:43Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:23:43Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
13
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
14
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
15
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
16
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
17
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
18
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
19
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
20
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
21
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
22
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
23
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
24
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
25
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
26
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
27
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
28
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
29
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
30
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1903041
reference_id show_bug.cgi?id=1903041
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:23:43Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1903041
31
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-7520
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-drjc-gxrt-q7ha
11
url VCID-frvc-mqhd-eydh
vulnerability_id VCID-frvc-mqhd-eydh
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6601.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6601.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6601
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29647
published_at 2026-04-18T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29669
published_at 2026-04-16T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29784
published_at 2026-04-02T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29745
published_at 2026-04-09T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29708
published_at 2026-04-08T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29646
published_at 2026-04-07T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.2983
published_at 2026-04-04T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29651
published_at 2026-04-13T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29703
published_at 2026-04-12T12:55:00Z
9
value 0.00112
scoring_system epss
scoring_elements 0.29747
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6601
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2296636
reference_id 2296636
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2296636
9
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
10
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
11
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
reference_id mfsa2024-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-29/
reference_id mfsa2024-29
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:21:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-29/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-30
reference_id mfsa2024-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-30
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-30/
reference_id mfsa2024-30
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:21:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-30/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-31
reference_id mfsa2024-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-31
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-31/
reference_id mfsa2024-31
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:21:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-31/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
reference_id mfsa2024-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-32/
reference_id mfsa2024-32
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:21:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-32/
20
reference_url https://access.redhat.com/errata/RHSA-2024:4500
reference_id RHSA-2024:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4500
21
reference_url https://access.redhat.com/errata/RHSA-2024:4501
reference_id RHSA-2024:4501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4501
22
reference_url https://access.redhat.com/errata/RHSA-2024:4508
reference_id RHSA-2024:4508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4508
23
reference_url https://access.redhat.com/errata/RHSA-2024:4517
reference_id RHSA-2024:4517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4517
24
reference_url https://access.redhat.com/errata/RHSA-2024:4586
reference_id RHSA-2024:4586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4586
25
reference_url https://access.redhat.com/errata/RHSA-2024:4590
reference_id RHSA-2024:4590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4590
26
reference_url https://access.redhat.com/errata/RHSA-2024:4610
reference_id RHSA-2024:4610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4610
27
reference_url https://access.redhat.com/errata/RHSA-2024:4624
reference_id RHSA-2024:4624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4624
28
reference_url https://access.redhat.com/errata/RHSA-2024:4625
reference_id RHSA-2024:4625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4625
29
reference_url https://access.redhat.com/errata/RHSA-2024:4634
reference_id RHSA-2024:4634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4634
30
reference_url https://access.redhat.com/errata/RHSA-2024:4635
reference_id RHSA-2024:4635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4635
31
reference_url https://access.redhat.com/errata/RHSA-2024:4670
reference_id RHSA-2024:4670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4670
32
reference_url https://access.redhat.com/errata/RHSA-2024:4671
reference_id RHSA-2024:4671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4671
33
reference_url https://access.redhat.com/errata/RHSA-2024:4673
reference_id RHSA-2024:4673
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4673
34
reference_url https://access.redhat.com/errata/RHSA-2024:4717
reference_id RHSA-2024:4717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4717
35
reference_url https://access.redhat.com/errata/RHSA-2024:4718
reference_id RHSA-2024:4718
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4718
36
reference_url https://access.redhat.com/errata/RHSA-2024:4894
reference_id RHSA-2024:4894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4894
37
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1890748
reference_id show_bug.cgi?id=1890748
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:21:13Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1890748
38
reference_url https://usn.ubuntu.com/6890-1/
reference_id USN-6890-1
reference_type
scores
url https://usn.ubuntu.com/6890-1/
39
reference_url https://usn.ubuntu.com/6903-1/
reference_id USN-6903-1
reference_type
scores
url https://usn.ubuntu.com/6903-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-6601
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-frvc-mqhd-eydh
12
url VCID-gpjz-649k-f3he
vulnerability_id VCID-gpjz-649k-f3he
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5696.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5696.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-5696
reference_id
reference_type
scores
0
value 0.02069
scoring_system epss
scoring_elements 0.83907
published_at 2026-04-07T12:55:00Z
1
value 0.02069
scoring_system epss
scoring_elements 0.83967
published_at 2026-04-18T12:55:00Z
2
value 0.02069
scoring_system epss
scoring_elements 0.83943
published_at 2026-04-13T12:55:00Z
3
value 0.02069
scoring_system epss
scoring_elements 0.83947
published_at 2026-04-12T12:55:00Z
4
value 0.02069
scoring_system epss
scoring_elements 0.83953
published_at 2026-04-11T12:55:00Z
5
value 0.02069
scoring_system epss
scoring_elements 0.83937
published_at 2026-04-09T12:55:00Z
6
value 0.02069
scoring_system epss
scoring_elements 0.8393
published_at 2026-04-08T12:55:00Z
7
value 0.02069
scoring_system epss
scoring_elements 0.83888
published_at 2026-04-02T12:55:00Z
8
value 0.02069
scoring_system epss
scoring_elements 0.83904
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-5696
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2291400
reference_id 2291400
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2291400
10
reference_url https://security.gentoo.org/glsa/202408-02
reference_id GLSA-202408-02
reference_type
scores
url https://security.gentoo.org/glsa/202408-02
11
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
12
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-25
reference_id mfsa2024-25
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-25
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-25/
reference_id mfsa2024-25
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/
url https://www.mozilla.org/security/advisories/mfsa2024-25/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-26
reference_id mfsa2024-26
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-26
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-26/
reference_id mfsa2024-26
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/
url https://www.mozilla.org/security/advisories/mfsa2024-26/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-28
reference_id mfsa2024-28
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-28
18
reference_url https://www.mozilla.org/security/advisories/mfsa2024-28/
reference_id mfsa2024-28
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/
url https://www.mozilla.org/security/advisories/mfsa2024-28/
19
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html
20
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html
21
reference_url https://access.redhat.com/errata/RHSA-2024:3949
reference_id RHSA-2024:3949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3949
22
reference_url https://access.redhat.com/errata/RHSA-2024:3950
reference_id RHSA-2024:3950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3950
23
reference_url https://access.redhat.com/errata/RHSA-2024:3951
reference_id RHSA-2024:3951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3951
24
reference_url https://access.redhat.com/errata/RHSA-2024:3952
reference_id RHSA-2024:3952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3952
25
reference_url https://access.redhat.com/errata/RHSA-2024:3953
reference_id RHSA-2024:3953
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3953
26
reference_url https://access.redhat.com/errata/RHSA-2024:3954
reference_id RHSA-2024:3954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3954
27
reference_url https://access.redhat.com/errata/RHSA-2024:3955
reference_id RHSA-2024:3955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3955
28
reference_url https://access.redhat.com/errata/RHSA-2024:3958
reference_id RHSA-2024:3958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3958
29
reference_url https://access.redhat.com/errata/RHSA-2024:3972
reference_id RHSA-2024:3972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3972
30
reference_url https://access.redhat.com/errata/RHSA-2024:4001
reference_id RHSA-2024:4001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4001
31
reference_url https://access.redhat.com/errata/RHSA-2024:4002
reference_id RHSA-2024:4002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4002
32
reference_url https://access.redhat.com/errata/RHSA-2024:4003
reference_id RHSA-2024:4003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4003
33
reference_url https://access.redhat.com/errata/RHSA-2024:4004
reference_id RHSA-2024:4004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4004
34
reference_url https://access.redhat.com/errata/RHSA-2024:4015
reference_id RHSA-2024:4015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4015
35
reference_url https://access.redhat.com/errata/RHSA-2024:4016
reference_id RHSA-2024:4016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4016
36
reference_url https://access.redhat.com/errata/RHSA-2024:4018
reference_id RHSA-2024:4018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4018
37
reference_url https://access.redhat.com/errata/RHSA-2024:4036
reference_id RHSA-2024:4036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4036
38
reference_url https://access.redhat.com/errata/RHSA-2024:4063
reference_id RHSA-2024:4063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4063
39
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1896555
reference_id show_bug.cgi?id=1896555
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1896555
40
reference_url https://usn.ubuntu.com/6840-1/
reference_id USN-6840-1
reference_type
scores
url https://usn.ubuntu.com/6840-1/
41
reference_url https://usn.ubuntu.com/6862-1/
reference_id USN-6862-1
reference_type
scores
url https://usn.ubuntu.com/6862-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-5696
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gpjz-649k-f3he
13
url VCID-gret-hn3p-5kbk
vulnerability_id VCID-gret-hn3p-5kbk
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7531.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7531.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7531
reference_id
reference_type
scores
0
value 0.00062
scoring_system epss
scoring_elements 0.19267
published_at 2026-04-18T12:55:00Z
1
value 0.00062
scoring_system epss
scoring_elements 0.19549
published_at 2026-04-04T12:55:00Z
2
value 0.00062
scoring_system epss
scoring_elements 0.19397
published_at 2026-04-09T12:55:00Z
3
value 0.00062
scoring_system epss
scoring_elements 0.19345
published_at 2026-04-08T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19502
published_at 2026-04-02T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.19266
published_at 2026-04-07T12:55:00Z
6
value 0.00062
scoring_system epss
scoring_elements 0.19259
published_at 2026-04-16T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.19297
published_at 2026-04-13T12:55:00Z
8
value 0.00062
scoring_system epss
scoring_elements 0.19353
published_at 2026-04-12T12:55:00Z
9
value 0.00062
scoring_system epss
scoring_elements 0.19402
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7531
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303148
reference_id 2303148
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303148
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-16T16:06:38Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-16T16:06:38Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-16T16:06:38Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
23
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1905691
reference_id show_bug.cgi?id=1905691
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-16T16:06:38Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1905691
24
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-7531
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gret-hn3p-5kbk
14
url VCID-hetc-sghb-1fcx
vulnerability_id VCID-hetc-sghb-1fcx
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8384.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8384.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8384
reference_id
reference_type
scores
0
value 0.00321
scoring_system epss
scoring_elements 0.55177
published_at 2026-04-02T12:55:00Z
1
value 0.00321
scoring_system epss
scoring_elements 0.55241
published_at 2026-04-18T12:55:00Z
2
value 0.00321
scoring_system epss
scoring_elements 0.55199
published_at 2026-04-13T12:55:00Z
3
value 0.00321
scoring_system epss
scoring_elements 0.55218
published_at 2026-04-12T12:55:00Z
4
value 0.00321
scoring_system epss
scoring_elements 0.55237
published_at 2026-04-16T12:55:00Z
5
value 0.00321
scoring_system epss
scoring_elements 0.55226
published_at 2026-04-09T12:55:00Z
6
value 0.00321
scoring_system epss
scoring_elements 0.55176
published_at 2026-04-07T12:55:00Z
7
value 0.00321
scoring_system epss
scoring_elements 0.55201
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8384
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8384
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2309430
reference_id 2309430
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2309430
5
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
6
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
7
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
reference_id mfsa2024-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-39/
reference_id mfsa2024-39
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/
url https://www.mozilla.org/security/advisories/mfsa2024-39/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
reference_id mfsa2024-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-40/
reference_id mfsa2024-40
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/
url https://www.mozilla.org/security/advisories/mfsa2024-40/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-41
reference_id mfsa2024-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-41
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-41/
reference_id mfsa2024-41
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/
url https://www.mozilla.org/security/advisories/mfsa2024-41/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
reference_id mfsa2024-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-43/
reference_id mfsa2024-43
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/
url https://www.mozilla.org/security/advisories/mfsa2024-43/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-44
reference_id mfsa2024-44
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-44
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-44/
reference_id mfsa2024-44
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/
url https://www.mozilla.org/security/advisories/mfsa2024-44/
18
reference_url https://access.redhat.com/errata/RHSA-2024:6681
reference_id RHSA-2024:6681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6681
19
reference_url https://access.redhat.com/errata/RHSA-2024:6682
reference_id RHSA-2024:6682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6682
20
reference_url https://access.redhat.com/errata/RHSA-2024:6683
reference_id RHSA-2024:6683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6683
21
reference_url https://access.redhat.com/errata/RHSA-2024:6684
reference_id RHSA-2024:6684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6684
22
reference_url https://access.redhat.com/errata/RHSA-2024:6719
reference_id RHSA-2024:6719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6719
23
reference_url https://access.redhat.com/errata/RHSA-2024:6720
reference_id RHSA-2024:6720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6720
24
reference_url https://access.redhat.com/errata/RHSA-2024:6721
reference_id RHSA-2024:6721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6721
25
reference_url https://access.redhat.com/errata/RHSA-2024:6722
reference_id RHSA-2024:6722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6722
26
reference_url https://access.redhat.com/errata/RHSA-2024:6723
reference_id RHSA-2024:6723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6723
27
reference_url https://access.redhat.com/errata/RHSA-2024:6782
reference_id RHSA-2024:6782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6782
28
reference_url https://access.redhat.com/errata/RHSA-2024:6786
reference_id RHSA-2024:6786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6786
29
reference_url https://access.redhat.com/errata/RHSA-2024:6816
reference_id RHSA-2024:6816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6816
30
reference_url https://access.redhat.com/errata/RHSA-2024:6838
reference_id RHSA-2024:6838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6838
31
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
32
reference_url https://access.redhat.com/errata/RHSA-2024:6850
reference_id RHSA-2024:6850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6850
33
reference_url https://access.redhat.com/errata/RHSA-2024:6891
reference_id RHSA-2024:6891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6891
34
reference_url https://access.redhat.com/errata/RHSA-2024:6892
reference_id RHSA-2024:6892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6892
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1911288
reference_id show_bug.cgi?id=1911288
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1911288
36
reference_url https://usn.ubuntu.com/6992-1/
reference_id USN-6992-1
reference_type
scores
url https://usn.ubuntu.com/6992-1/
37
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-8384
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hetc-sghb-1fcx
15
url VCID-jt6f-rpfx-7kbj
vulnerability_id VCID-jt6f-rpfx-7kbj
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8383.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8383.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8383
reference_id
reference_type
scores
0
value 0.00223
scoring_system epss
scoring_elements 0.44901
published_at 2026-04-07T12:55:00Z
1
value 0.00223
scoring_system epss
scoring_elements 0.44976
published_at 2026-04-11T12:55:00Z
2
value 0.00223
scoring_system epss
scoring_elements 0.44954
published_at 2026-04-09T12:55:00Z
3
value 0.00223
scoring_system epss
scoring_elements 0.44939
published_at 2026-04-02T12:55:00Z
4
value 0.00223
scoring_system epss
scoring_elements 0.4496
published_at 2026-04-04T12:55:00Z
5
value 0.00223
scoring_system epss
scoring_elements 0.44953
published_at 2026-04-08T12:55:00Z
6
value 0.00223
scoring_system epss
scoring_elements 0.44991
published_at 2026-04-18T12:55:00Z
7
value 0.00223
scoring_system epss
scoring_elements 0.44997
published_at 2026-04-16T12:55:00Z
8
value 0.00223
scoring_system epss
scoring_elements 0.44946
published_at 2026-04-13T12:55:00Z
9
value 0.00223
scoring_system epss
scoring_elements 0.44944
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8383
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8383
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2309429
reference_id 2309429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2309429
5
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
6
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
7
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
reference_id mfsa2024-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-39/
reference_id mfsa2024-39
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-30T16:16:58Z/
url https://www.mozilla.org/security/advisories/mfsa2024-39/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
reference_id mfsa2024-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-40/
reference_id mfsa2024-40
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-30T16:16:58Z/
url https://www.mozilla.org/security/advisories/mfsa2024-40/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-41
reference_id mfsa2024-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-41
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-41/
reference_id mfsa2024-41
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-30T16:16:58Z/
url https://www.mozilla.org/security/advisories/mfsa2024-41/
14
reference_url https://access.redhat.com/errata/RHSA-2024:6681
reference_id RHSA-2024:6681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6681
15
reference_url https://access.redhat.com/errata/RHSA-2024:6682
reference_id RHSA-2024:6682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6682
16
reference_url https://access.redhat.com/errata/RHSA-2024:6782
reference_id RHSA-2024:6782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6782
17
reference_url https://access.redhat.com/errata/RHSA-2024:6786
reference_id RHSA-2024:6786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6786
18
reference_url https://access.redhat.com/errata/RHSA-2024:6838
reference_id RHSA-2024:6838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6838
19
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
20
reference_url https://access.redhat.com/errata/RHSA-2024:6850
reference_id RHSA-2024:6850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6850
21
reference_url https://access.redhat.com/errata/RHSA-2024:6891
reference_id RHSA-2024:6891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6891
22
reference_url https://access.redhat.com/errata/RHSA-2024:6892
reference_id RHSA-2024:6892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6892
23
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1908496
reference_id show_bug.cgi?id=1908496
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-30T16:16:58Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1908496
24
reference_url https://usn.ubuntu.com/6992-1/
reference_id USN-6992-1
reference_type
scores
url https://usn.ubuntu.com/6992-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-8383
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jt6f-rpfx-7kbj
16
url VCID-mj7u-bpwq-jkhu
vulnerability_id VCID-mj7u-bpwq-jkhu
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8389.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8389.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8389
reference_id
reference_type
scores
0
value 0.0072
scoring_system epss
scoring_elements 0.72514
published_at 2026-04-18T12:55:00Z
1
value 0.0072
scoring_system epss
scoring_elements 0.72456
published_at 2026-04-08T12:55:00Z
2
value 0.0072
scoring_system epss
scoring_elements 0.72468
published_at 2026-04-09T12:55:00Z
3
value 0.0072
scoring_system epss
scoring_elements 0.72492
published_at 2026-04-11T12:55:00Z
4
value 0.0072
scoring_system epss
scoring_elements 0.72474
published_at 2026-04-12T12:55:00Z
5
value 0.0072
scoring_system epss
scoring_elements 0.72464
published_at 2026-04-13T12:55:00Z
6
value 0.0072
scoring_system epss
scoring_elements 0.72506
published_at 2026-04-16T12:55:00Z
7
value 0.0072
scoring_system epss
scoring_elements 0.72423
published_at 2026-04-02T12:55:00Z
8
value 0.0072
scoring_system epss
scoring_elements 0.7244
published_at 2026-04-04T12:55:00Z
9
value 0.0072
scoring_system epss
scoring_elements 0.72417
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8389
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2309435
reference_id 2309435
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2309435
4
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1907230%2C1909367
reference_id buglist.cgi?bug_id=1907230%2C1909367
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:39:40Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1907230%2C1909367
5
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
6
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
7
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
reference_id mfsa2024-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-39/
reference_id mfsa2024-39
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:39:40Z/
url https://www.mozilla.org/security/advisories/mfsa2024-39/
10
reference_url https://usn.ubuntu.com/6992-1/
reference_id USN-6992-1
reference_type
scores
url https://usn.ubuntu.com/6992-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-8389
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mj7u-bpwq-jkhu
17
url VCID-pst5-367g-h7cs
vulnerability_id VCID-pst5-367g-h7cs
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8386.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8386.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8386
reference_id
reference_type
scores
0
value 0.00271
scoring_system epss
scoring_elements 0.50627
published_at 2026-04-18T12:55:00Z
1
value 0.00271
scoring_system epss
scoring_elements 0.50523
published_at 2026-04-07T12:55:00Z
2
value 0.00271
scoring_system epss
scoring_elements 0.50622
published_at 2026-04-16T12:55:00Z
3
value 0.00271
scoring_system epss
scoring_elements 0.5058
published_at 2026-04-13T12:55:00Z
4
value 0.00271
scoring_system epss
scoring_elements 0.50595
published_at 2026-04-12T12:55:00Z
5
value 0.00271
scoring_system epss
scoring_elements 0.50617
published_at 2026-04-11T12:55:00Z
6
value 0.00271
scoring_system epss
scoring_elements 0.50575
published_at 2026-04-09T12:55:00Z
7
value 0.00271
scoring_system epss
scoring_elements 0.50578
published_at 2026-04-08T12:55:00Z
8
value 0.00271
scoring_system epss
scoring_elements 0.50543
published_at 2026-04-02T12:55:00Z
9
value 0.00271
scoring_system epss
scoring_elements 0.5057
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8386
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2309432
reference_id 2309432
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2309432
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
reference_id mfsa2024-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-39/
reference_id mfsa2024-39
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-39/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
reference_id mfsa2024-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-40/
reference_id mfsa2024-40
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-40/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
reference_id mfsa2024-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-43/
reference_id mfsa2024-43
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-43/
13
reference_url https://access.redhat.com/errata/RHSA-2024:6681
reference_id RHSA-2024:6681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6681
14
reference_url https://access.redhat.com/errata/RHSA-2024:6682
reference_id RHSA-2024:6682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6682
15
reference_url https://access.redhat.com/errata/RHSA-2024:6683
reference_id RHSA-2024:6683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6683
16
reference_url https://access.redhat.com/errata/RHSA-2024:6684
reference_id RHSA-2024:6684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6684
17
reference_url https://access.redhat.com/errata/RHSA-2024:6719
reference_id RHSA-2024:6719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6719
18
reference_url https://access.redhat.com/errata/RHSA-2024:6720
reference_id RHSA-2024:6720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6720
19
reference_url https://access.redhat.com/errata/RHSA-2024:6721
reference_id RHSA-2024:6721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6721
20
reference_url https://access.redhat.com/errata/RHSA-2024:6722
reference_id RHSA-2024:6722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6722
21
reference_url https://access.redhat.com/errata/RHSA-2024:6723
reference_id RHSA-2024:6723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6723
22
reference_url https://access.redhat.com/errata/RHSA-2024:6782
reference_id RHSA-2024:6782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6782
23
reference_url https://access.redhat.com/errata/RHSA-2024:6786
reference_id RHSA-2024:6786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6786
24
reference_url https://access.redhat.com/errata/RHSA-2024:6816
reference_id RHSA-2024:6816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6816
25
reference_url https://access.redhat.com/errata/RHSA-2024:6838
reference_id RHSA-2024:6838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6838
26
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
27
reference_url https://access.redhat.com/errata/RHSA-2024:6850
reference_id RHSA-2024:6850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6850
28
reference_url https://access.redhat.com/errata/RHSA-2024:6891
reference_id RHSA-2024:6891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6891
29
reference_url https://access.redhat.com/errata/RHSA-2024:6892
reference_id RHSA-2024:6892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6892
30
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1907032
reference_id show_bug.cgi?id=1907032
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1907032
31
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1909163
reference_id show_bug.cgi?id=1909163
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1909163
32
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1909529
reference_id show_bug.cgi?id=1909529
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1909529
33
reference_url https://usn.ubuntu.com/6992-1/
reference_id USN-6992-1
reference_type
scores
url https://usn.ubuntu.com/6992-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-8386
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pst5-367g-h7cs
18
url VCID-qd97-asaa-2fey
vulnerability_id VCID-qd97-asaa-2fey
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8385.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8385.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8385
reference_id
reference_type
scores
0
value 0.00278
scoring_system epss
scoring_elements 0.51269
published_at 2026-04-18T12:55:00Z
1
value 0.00278
scoring_system epss
scoring_elements 0.51164
published_at 2026-04-07T12:55:00Z
2
value 0.00278
scoring_system epss
scoring_elements 0.51216
published_at 2026-04-09T12:55:00Z
3
value 0.00278
scoring_system epss
scoring_elements 0.51219
published_at 2026-04-08T12:55:00Z
4
value 0.00278
scoring_system epss
scoring_elements 0.51181
published_at 2026-04-02T12:55:00Z
5
value 0.00278
scoring_system epss
scoring_elements 0.51206
published_at 2026-04-04T12:55:00Z
6
value 0.00278
scoring_system epss
scoring_elements 0.51262
published_at 2026-04-16T12:55:00Z
7
value 0.00278
scoring_system epss
scoring_elements 0.51224
published_at 2026-04-13T12:55:00Z
8
value 0.00278
scoring_system epss
scoring_elements 0.51238
published_at 2026-04-12T12:55:00Z
9
value 0.00278
scoring_system epss
scoring_elements 0.51259
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8385
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2309431
reference_id 2309431
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2309431
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
reference_id mfsa2024-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-39/
reference_id mfsa2024-39
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:46:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-39/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
reference_id mfsa2024-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-40/
reference_id mfsa2024-40
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:46:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-40/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
reference_id mfsa2024-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-43/
reference_id mfsa2024-43
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:46:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-43/
13
reference_url https://access.redhat.com/errata/RHSA-2024:6681
reference_id RHSA-2024:6681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6681
14
reference_url https://access.redhat.com/errata/RHSA-2024:6682
reference_id RHSA-2024:6682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6682
15
reference_url https://access.redhat.com/errata/RHSA-2024:6683
reference_id RHSA-2024:6683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6683
16
reference_url https://access.redhat.com/errata/RHSA-2024:6684
reference_id RHSA-2024:6684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6684
17
reference_url https://access.redhat.com/errata/RHSA-2024:6719
reference_id RHSA-2024:6719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6719
18
reference_url https://access.redhat.com/errata/RHSA-2024:6720
reference_id RHSA-2024:6720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6720
19
reference_url https://access.redhat.com/errata/RHSA-2024:6721
reference_id RHSA-2024:6721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6721
20
reference_url https://access.redhat.com/errata/RHSA-2024:6722
reference_id RHSA-2024:6722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6722
21
reference_url https://access.redhat.com/errata/RHSA-2024:6723
reference_id RHSA-2024:6723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6723
22
reference_url https://access.redhat.com/errata/RHSA-2024:6782
reference_id RHSA-2024:6782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6782
23
reference_url https://access.redhat.com/errata/RHSA-2024:6786
reference_id RHSA-2024:6786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6786
24
reference_url https://access.redhat.com/errata/RHSA-2024:6816
reference_id RHSA-2024:6816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6816
25
reference_url https://access.redhat.com/errata/RHSA-2024:6838
reference_id RHSA-2024:6838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6838
26
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
27
reference_url https://access.redhat.com/errata/RHSA-2024:6850
reference_id RHSA-2024:6850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6850
28
reference_url https://access.redhat.com/errata/RHSA-2024:6891
reference_id RHSA-2024:6891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6891
29
reference_url https://access.redhat.com/errata/RHSA-2024:6892
reference_id RHSA-2024:6892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6892
30
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1911909
reference_id show_bug.cgi?id=1911909
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:46:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1911909
31
reference_url https://usn.ubuntu.com/6992-1/
reference_id USN-6992-1
reference_type
scores
url https://usn.ubuntu.com/6992-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-8385
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qd97-asaa-2fey
19
url VCID-s556-eg79-77gu
vulnerability_id VCID-s556-eg79-77gu
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7522.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7522.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7522
reference_id
reference_type
scores
0
value 0.00247
scoring_system epss
scoring_elements 0.47992
published_at 2026-04-18T12:55:00Z
1
value 0.00247
scoring_system epss
scoring_elements 0.47914
published_at 2026-04-02T12:55:00Z
2
value 0.00247
scoring_system epss
scoring_elements 0.47997
published_at 2026-04-16T12:55:00Z
3
value 0.00247
scoring_system epss
scoring_elements 0.47942
published_at 2026-04-13T12:55:00Z
4
value 0.00247
scoring_system epss
scoring_elements 0.47884
published_at 2026-04-07T12:55:00Z
5
value 0.00247
scoring_system epss
scoring_elements 0.47936
published_at 2026-04-08T12:55:00Z
6
value 0.00247
scoring_system epss
scoring_elements 0.47935
published_at 2026-04-04T12:55:00Z
7
value 0.00247
scoring_system epss
scoring_elements 0.47933
published_at 2026-04-12T12:55:00Z
8
value 0.00247
scoring_system epss
scoring_elements 0.47955
published_at 2026-04-11T12:55:00Z
9
value 0.00247
scoring_system epss
scoring_elements 0.47931
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7522
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303139
reference_id 2303139
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303139
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
reference_id mfsa2024-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
25
reference_url https://www.mozilla.org/security/advisories/mfsa2024-38/
reference_id mfsa2024-38
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/
url https://www.mozilla.org/security/advisories/mfsa2024-38/
26
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
27
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
28
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
29
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
30
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
31
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
32
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
33
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
34
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
35
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
36
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
37
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
38
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
39
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
40
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
41
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
42
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
43
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1906727
reference_id show_bug.cgi?id=1906727
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1906727
44
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
45
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-7522
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s556-eg79-77gu
20
url VCID-svqy-5b6h-7yfj
vulnerability_id VCID-svqy-5b6h-7yfj
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6603.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6603.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6603
reference_id
reference_type
scores
0
value 0.00344
scoring_system epss
scoring_elements 0.57095
published_at 2026-04-16T12:55:00Z
1
value 0.00344
scoring_system epss
scoring_elements 0.57067
published_at 2026-04-13T12:55:00Z
2
value 0.00344
scoring_system epss
scoring_elements 0.57048
published_at 2026-04-02T12:55:00Z
3
value 0.00344
scoring_system epss
scoring_elements 0.571
published_at 2026-04-09T12:55:00Z
4
value 0.00344
scoring_system epss
scoring_elements 0.57098
published_at 2026-04-08T12:55:00Z
5
value 0.00344
scoring_system epss
scoring_elements 0.57047
published_at 2026-04-07T12:55:00Z
6
value 0.00344
scoring_system epss
scoring_elements 0.57069
published_at 2026-04-04T12:55:00Z
7
value 0.00344
scoring_system epss
scoring_elements 0.5709
published_at 2026-04-18T12:55:00Z
8
value 0.00344
scoring_system epss
scoring_elements 0.57111
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6603
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2296638
reference_id 2296638
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2296638
9
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
10
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
11
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
reference_id mfsa2024-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-29/
reference_id mfsa2024-29
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T15:12:02Z/
url https://www.mozilla.org/security/advisories/mfsa2024-29/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-30
reference_id mfsa2024-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-30
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-30/
reference_id mfsa2024-30
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T15:12:02Z/
url https://www.mozilla.org/security/advisories/mfsa2024-30/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-31
reference_id mfsa2024-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-31
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-31/
reference_id mfsa2024-31
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T15:12:02Z/
url https://www.mozilla.org/security/advisories/mfsa2024-31/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
reference_id mfsa2024-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-32/
reference_id mfsa2024-32
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T15:12:02Z/
url https://www.mozilla.org/security/advisories/mfsa2024-32/
20
reference_url https://access.redhat.com/errata/RHSA-2024:4500
reference_id RHSA-2024:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4500
21
reference_url https://access.redhat.com/errata/RHSA-2024:4501
reference_id RHSA-2024:4501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4501
22
reference_url https://access.redhat.com/errata/RHSA-2024:4508
reference_id RHSA-2024:4508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4508
23
reference_url https://access.redhat.com/errata/RHSA-2024:4517
reference_id RHSA-2024:4517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4517
24
reference_url https://access.redhat.com/errata/RHSA-2024:4586
reference_id RHSA-2024:4586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4586
25
reference_url https://access.redhat.com/errata/RHSA-2024:4590
reference_id RHSA-2024:4590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4590
26
reference_url https://access.redhat.com/errata/RHSA-2024:4610
reference_id RHSA-2024:4610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4610
27
reference_url https://access.redhat.com/errata/RHSA-2024:4624
reference_id RHSA-2024:4624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4624
28
reference_url https://access.redhat.com/errata/RHSA-2024:4625
reference_id RHSA-2024:4625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4625
29
reference_url https://access.redhat.com/errata/RHSA-2024:4634
reference_id RHSA-2024:4634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4634
30
reference_url https://access.redhat.com/errata/RHSA-2024:4635
reference_id RHSA-2024:4635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4635
31
reference_url https://access.redhat.com/errata/RHSA-2024:4670
reference_id RHSA-2024:4670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4670
32
reference_url https://access.redhat.com/errata/RHSA-2024:4671
reference_id RHSA-2024:4671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4671
33
reference_url https://access.redhat.com/errata/RHSA-2024:4673
reference_id RHSA-2024:4673
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4673
34
reference_url https://access.redhat.com/errata/RHSA-2024:4717
reference_id RHSA-2024:4717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4717
35
reference_url https://access.redhat.com/errata/RHSA-2024:4718
reference_id RHSA-2024:4718
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4718
36
reference_url https://access.redhat.com/errata/RHSA-2024:4894
reference_id RHSA-2024:4894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4894
37
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1895081
reference_id show_bug.cgi?id=1895081
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T15:12:02Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1895081
38
reference_url https://usn.ubuntu.com/6890-1/
reference_id USN-6890-1
reference_type
scores
url https://usn.ubuntu.com/6890-1/
39
reference_url https://usn.ubuntu.com/6903-1/
reference_id USN-6903-1
reference_type
scores
url https://usn.ubuntu.com/6903-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-6603
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-svqy-5b6h-7yfj
21
url VCID-t52p-7rr7-57ax
vulnerability_id VCID-t52p-7rr7-57ax
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6604.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6604.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6604
reference_id
reference_type
scores
0
value 0.0038
scoring_system epss
scoring_elements 0.59526
published_at 2026-04-18T12:55:00Z
1
value 0.0038
scoring_system epss
scoring_elements 0.5952
published_at 2026-04-16T12:55:00Z
2
value 0.0038
scoring_system epss
scoring_elements 0.59447
published_at 2026-04-02T12:55:00Z
3
value 0.0038
scoring_system epss
scoring_elements 0.59503
published_at 2026-04-09T12:55:00Z
4
value 0.0038
scoring_system epss
scoring_elements 0.5949
published_at 2026-04-08T12:55:00Z
5
value 0.0038
scoring_system epss
scoring_elements 0.59439
published_at 2026-04-07T12:55:00Z
6
value 0.0038
scoring_system epss
scoring_elements 0.59472
published_at 2026-04-04T12:55:00Z
7
value 0.0038
scoring_system epss
scoring_elements 0.59486
published_at 2026-04-13T12:55:00Z
8
value 0.0038
scoring_system epss
scoring_elements 0.59506
published_at 2026-04-12T12:55:00Z
9
value 0.0038
scoring_system epss
scoring_elements 0.59522
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6604
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2296639
reference_id 2296639
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2296639
9
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1748105%2C1837550%2C1884266
reference_id buglist.cgi?bug_id=1748105%2C1837550%2C1884266
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:20:14Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1748105%2C1837550%2C1884266
10
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
11
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
12
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
reference_id mfsa2024-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-29/
reference_id mfsa2024-29
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:20:14Z/
url https://www.mozilla.org/security/advisories/mfsa2024-29/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-30
reference_id mfsa2024-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-30
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-30/
reference_id mfsa2024-30
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:20:14Z/
url https://www.mozilla.org/security/advisories/mfsa2024-30/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-31
reference_id mfsa2024-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-31
18
reference_url https://www.mozilla.org/security/advisories/mfsa2024-31/
reference_id mfsa2024-31
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:20:14Z/
url https://www.mozilla.org/security/advisories/mfsa2024-31/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
reference_id mfsa2024-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
20
reference_url https://www.mozilla.org/security/advisories/mfsa2024-32/
reference_id mfsa2024-32
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:20:14Z/
url https://www.mozilla.org/security/advisories/mfsa2024-32/
21
reference_url https://access.redhat.com/errata/RHSA-2024:4500
reference_id RHSA-2024:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4500
22
reference_url https://access.redhat.com/errata/RHSA-2024:4501
reference_id RHSA-2024:4501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4501
23
reference_url https://access.redhat.com/errata/RHSA-2024:4508
reference_id RHSA-2024:4508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4508
24
reference_url https://access.redhat.com/errata/RHSA-2024:4517
reference_id RHSA-2024:4517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4517
25
reference_url https://access.redhat.com/errata/RHSA-2024:4586
reference_id RHSA-2024:4586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4586
26
reference_url https://access.redhat.com/errata/RHSA-2024:4590
reference_id RHSA-2024:4590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4590
27
reference_url https://access.redhat.com/errata/RHSA-2024:4610
reference_id RHSA-2024:4610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4610
28
reference_url https://access.redhat.com/errata/RHSA-2024:4624
reference_id RHSA-2024:4624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4624
29
reference_url https://access.redhat.com/errata/RHSA-2024:4625
reference_id RHSA-2024:4625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4625
30
reference_url https://access.redhat.com/errata/RHSA-2024:4634
reference_id RHSA-2024:4634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4634
31
reference_url https://access.redhat.com/errata/RHSA-2024:4635
reference_id RHSA-2024:4635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4635
32
reference_url https://access.redhat.com/errata/RHSA-2024:4670
reference_id RHSA-2024:4670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4670
33
reference_url https://access.redhat.com/errata/RHSA-2024:4671
reference_id RHSA-2024:4671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4671
34
reference_url https://access.redhat.com/errata/RHSA-2024:4673
reference_id RHSA-2024:4673
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4673
35
reference_url https://access.redhat.com/errata/RHSA-2024:4717
reference_id RHSA-2024:4717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4717
36
reference_url https://access.redhat.com/errata/RHSA-2024:4718
reference_id RHSA-2024:4718
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4718
37
reference_url https://access.redhat.com/errata/RHSA-2024:4894
reference_id RHSA-2024:4894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4894
38
reference_url https://usn.ubuntu.com/6890-1/
reference_id USN-6890-1
reference_type
scores
url https://usn.ubuntu.com/6890-1/
39
reference_url https://usn.ubuntu.com/6903-1/
reference_id USN-6903-1
reference_type
scores
url https://usn.ubuntu.com/6903-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-6604
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t52p-7rr7-57ax
22
url VCID-tegn-2y58-t3de
vulnerability_id VCID-tegn-2y58-t3de
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7521.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7521.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7521
reference_id
reference_type
scores
0
value 0.00261
scoring_system epss
scoring_elements 0.49475
published_at 2026-04-18T12:55:00Z
1
value 0.00261
scoring_system epss
scoring_elements 0.49411
published_at 2026-04-02T12:55:00Z
2
value 0.00261
scoring_system epss
scoring_elements 0.49477
published_at 2026-04-16T12:55:00Z
3
value 0.00261
scoring_system epss
scoring_elements 0.49431
published_at 2026-04-13T12:55:00Z
4
value 0.00261
scoring_system epss
scoring_elements 0.49391
published_at 2026-04-07T12:55:00Z
5
value 0.00261
scoring_system epss
scoring_elements 0.49445
published_at 2026-04-08T12:55:00Z
6
value 0.00261
scoring_system epss
scoring_elements 0.49437
published_at 2026-04-04T12:55:00Z
7
value 0.00261
scoring_system epss
scoring_elements 0.49429
published_at 2026-04-12T12:55:00Z
8
value 0.00261
scoring_system epss
scoring_elements 0.49458
published_at 2026-04-11T12:55:00Z
9
value 0.00261
scoring_system epss
scoring_elements 0.49441
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7521
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303138
reference_id 2303138
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303138
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
reference_id mfsa2024-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
25
reference_url https://www.mozilla.org/security/advisories/mfsa2024-38/
reference_id mfsa2024-38
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-38/
26
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
27
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
28
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
29
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
30
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
31
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
32
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
33
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
34
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
35
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
36
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
37
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
38
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
39
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
40
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
41
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
42
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
43
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1904644
reference_id show_bug.cgi?id=1904644
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1904644
44
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
45
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-7521
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tegn-2y58-t3de
23
url VCID-ux24-3d83-23c6
vulnerability_id VCID-ux24-3d83-23c6
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8381.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8381.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8381
reference_id
reference_type
scores
0
value 0.11622
scoring_system epss
scoring_elements 0.93646
published_at 2026-04-08T12:55:00Z
1
value 0.11622
scoring_system epss
scoring_elements 0.93648
published_at 2026-04-09T12:55:00Z
2
value 0.11622
scoring_system epss
scoring_elements 0.93679
published_at 2026-04-18T12:55:00Z
3
value 0.11622
scoring_system epss
scoring_elements 0.93654
published_at 2026-04-13T12:55:00Z
4
value 0.11622
scoring_system epss
scoring_elements 0.93672
published_at 2026-04-16T12:55:00Z
5
value 0.11622
scoring_system epss
scoring_elements 0.93653
published_at 2026-04-12T12:55:00Z
6
value 0.12468
scoring_system epss
scoring_elements 0.93882
published_at 2026-04-02T12:55:00Z
7
value 0.12468
scoring_system epss
scoring_elements 0.93895
published_at 2026-04-07T12:55:00Z
8
value 0.12468
scoring_system epss
scoring_elements 0.93891
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8381
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8381
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2309427
reference_id 2309427
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2309427
5
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
6
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
7
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
reference_id mfsa2024-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-39
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-39/
reference_id mfsa2024-39
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/
url https://www.mozilla.org/security/advisories/mfsa2024-39/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
reference_id mfsa2024-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-40
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-40/
reference_id mfsa2024-40
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/
url https://www.mozilla.org/security/advisories/mfsa2024-40/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-41
reference_id mfsa2024-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-41
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-41/
reference_id mfsa2024-41
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/
url https://www.mozilla.org/security/advisories/mfsa2024-41/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
reference_id mfsa2024-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-43
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-43/
reference_id mfsa2024-43
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/
url https://www.mozilla.org/security/advisories/mfsa2024-43/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-44
reference_id mfsa2024-44
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-44
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-44/
reference_id mfsa2024-44
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/
url https://www.mozilla.org/security/advisories/mfsa2024-44/
18
reference_url https://access.redhat.com/errata/RHSA-2024:6681
reference_id RHSA-2024:6681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6681
19
reference_url https://access.redhat.com/errata/RHSA-2024:6682
reference_id RHSA-2024:6682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6682
20
reference_url https://access.redhat.com/errata/RHSA-2024:6683
reference_id RHSA-2024:6683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6683
21
reference_url https://access.redhat.com/errata/RHSA-2024:6684
reference_id RHSA-2024:6684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6684
22
reference_url https://access.redhat.com/errata/RHSA-2024:6719
reference_id RHSA-2024:6719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6719
23
reference_url https://access.redhat.com/errata/RHSA-2024:6720
reference_id RHSA-2024:6720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6720
24
reference_url https://access.redhat.com/errata/RHSA-2024:6721
reference_id RHSA-2024:6721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6721
25
reference_url https://access.redhat.com/errata/RHSA-2024:6722
reference_id RHSA-2024:6722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6722
26
reference_url https://access.redhat.com/errata/RHSA-2024:6723
reference_id RHSA-2024:6723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6723
27
reference_url https://access.redhat.com/errata/RHSA-2024:6782
reference_id RHSA-2024:6782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6782
28
reference_url https://access.redhat.com/errata/RHSA-2024:6786
reference_id RHSA-2024:6786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6786
29
reference_url https://access.redhat.com/errata/RHSA-2024:6816
reference_id RHSA-2024:6816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6816
30
reference_url https://access.redhat.com/errata/RHSA-2024:6838
reference_id RHSA-2024:6838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6838
31
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
32
reference_url https://access.redhat.com/errata/RHSA-2024:6850
reference_id RHSA-2024:6850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6850
33
reference_url https://access.redhat.com/errata/RHSA-2024:6891
reference_id RHSA-2024:6891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6891
34
reference_url https://access.redhat.com/errata/RHSA-2024:6892
reference_id RHSA-2024:6892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6892
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1912715
reference_id show_bug.cgi?id=1912715
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1912715
36
reference_url https://usn.ubuntu.com/6992-1/
reference_id USN-6992-1
reference_type
scores
url https://usn.ubuntu.com/6992-1/
37
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-8381
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ux24-3d83-23c6
24
url VCID-w794-gqex-83du
vulnerability_id VCID-w794-gqex-83du
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6602.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6602.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6602
reference_id
reference_type
scores
0
value 0.00768
scoring_system epss
scoring_elements 0.73541
published_at 2026-04-18T12:55:00Z
1
value 0.00768
scoring_system epss
scoring_elements 0.73532
published_at 2026-04-16T12:55:00Z
2
value 0.00768
scoring_system epss
scoring_elements 0.73448
published_at 2026-04-02T12:55:00Z
3
value 0.00768
scoring_system epss
scoring_elements 0.7349
published_at 2026-04-13T12:55:00Z
4
value 0.00768
scoring_system epss
scoring_elements 0.73497
published_at 2026-04-12T12:55:00Z
5
value 0.00768
scoring_system epss
scoring_elements 0.73471
published_at 2026-04-04T12:55:00Z
6
value 0.00768
scoring_system epss
scoring_elements 0.73443
published_at 2026-04-07T12:55:00Z
7
value 0.00768
scoring_system epss
scoring_elements 0.73517
published_at 2026-04-11T12:55:00Z
8
value 0.00768
scoring_system epss
scoring_elements 0.7348
published_at 2026-04-08T12:55:00Z
9
value 0.00768
scoring_system epss
scoring_elements 0.73493
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6602
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2296637
reference_id 2296637
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2296637
9
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
10
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
11
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
reference_id mfsa2024-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-29
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-29/
reference_id mfsa2024-29
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-29/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-30
reference_id mfsa2024-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-30
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-30/
reference_id mfsa2024-30
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-30/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-31
reference_id mfsa2024-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-31
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-31/
reference_id mfsa2024-31
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-31/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
reference_id mfsa2024-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-32
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-32/
reference_id mfsa2024-32
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-32/
20
reference_url https://access.redhat.com/errata/RHSA-2024:4625
reference_id RHSA-2024:4625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4625
21
reference_url https://access.redhat.com/errata/RHSA-2024:4670
reference_id RHSA-2024:4670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4670
22
reference_url https://access.redhat.com/errata/RHSA-2024:4671
reference_id RHSA-2024:4671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4671
23
reference_url https://access.redhat.com/errata/RHSA-2024:4717
reference_id RHSA-2024:4717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4717
24
reference_url https://access.redhat.com/errata/RHSA-2024:4718
reference_id RHSA-2024:4718
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4718
25
reference_url https://access.redhat.com/errata/RHSA-2024:4894
reference_id RHSA-2024:4894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4894
26
reference_url https://access.redhat.com/errata/RHSA-2024:6839
reference_id RHSA-2024:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6839
27
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1895032
reference_id show_bug.cgi?id=1895032
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1895032
28
reference_url https://usn.ubuntu.com/6890-1/
reference_id USN-6890-1
reference_type
scores
url https://usn.ubuntu.com/6890-1/
29
reference_url https://usn.ubuntu.com/6903-1/
reference_id USN-6903-1
reference_type
scores
url https://usn.ubuntu.com/6903-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-6602
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w794-gqex-83du
25
url VCID-xevc-xbcg-1yct
vulnerability_id VCID-xevc-xbcg-1yct
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7526.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7526.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7526
reference_id
reference_type
scores
0
value 0.00272
scoring_system epss
scoring_elements 0.50681
published_at 2026-04-18T12:55:00Z
1
value 0.00272
scoring_system epss
scoring_elements 0.50598
published_at 2026-04-02T12:55:00Z
2
value 0.00272
scoring_system epss
scoring_elements 0.50675
published_at 2026-04-16T12:55:00Z
3
value 0.00272
scoring_system epss
scoring_elements 0.50634
published_at 2026-04-13T12:55:00Z
4
value 0.00272
scoring_system epss
scoring_elements 0.50578
published_at 2026-04-07T12:55:00Z
5
value 0.00272
scoring_system epss
scoring_elements 0.50632
published_at 2026-04-08T12:55:00Z
6
value 0.00272
scoring_system epss
scoring_elements 0.50626
published_at 2026-04-04T12:55:00Z
7
value 0.00272
scoring_system epss
scoring_elements 0.50648
published_at 2026-04-12T12:55:00Z
8
value 0.00272
scoring_system epss
scoring_elements 0.50671
published_at 2026-04-11T12:55:00Z
9
value 0.00272
scoring_system epss
scoring_elements 0.50629
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7526
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303143
reference_id 2303143
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303143
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
reference_id mfsa2024-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
25
reference_url https://www.mozilla.org/security/advisories/mfsa2024-38/
reference_id mfsa2024-38
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-38/
26
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
27
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
28
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
29
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
30
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
31
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
32
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
33
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
34
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
35
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
36
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
37
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
38
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
39
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
40
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
41
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
42
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
43
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1910306
reference_id show_bug.cgi?id=1910306
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1910306
44
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
45
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-7526
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xevc-xbcg-1yct
26
url VCID-xyqa-esey-73e1
vulnerability_id VCID-xyqa-esey-73e1
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7525.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7525.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7525
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33449
published_at 2026-04-18T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.33549
published_at 2026-04-02T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33474
published_at 2026-04-16T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33437
published_at 2026-04-13T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33421
published_at 2026-04-07T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.33465
published_at 2026-04-08T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.33582
published_at 2026-04-04T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33461
published_at 2026-04-12T12:55:00Z
8
value 0.00137
scoring_system epss
scoring_elements 0.33502
published_at 2026-04-11T12:55:00Z
9
value 0.00137
scoring_system epss
scoring_elements 0.33499
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7525
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303142
reference_id 2303142
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303142
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
reference_id mfsa2024-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
25
reference_url https://www.mozilla.org/security/advisories/mfsa2024-38/
reference_id mfsa2024-38
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-38/
26
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
27
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
28
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
29
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
30
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
31
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
32
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
33
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
34
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
35
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
36
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
37
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
38
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
39
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
40
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
41
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
42
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
43
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1909298
reference_id show_bug.cgi?id=1909298
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1909298
44
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
45
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-7525
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xyqa-esey-73e1
27
url VCID-z6kw-szww-7feq
vulnerability_id VCID-z6kw-szww-7feq
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7529.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7529.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7529
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.3183
published_at 2026-04-18T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.31947
published_at 2026-04-02T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.31849
published_at 2026-04-16T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.31818
published_at 2026-04-13T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31808
published_at 2026-04-07T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31861
published_at 2026-04-08T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31988
published_at 2026-04-04T12:55:00Z
7
value 0.00126
scoring_system epss
scoring_elements 0.31853
published_at 2026-04-12T12:55:00Z
8
value 0.00126
scoring_system epss
scoring_elements 0.31892
published_at 2026-04-11T12:55:00Z
9
value 0.00126
scoring_system epss
scoring_elements 0.31889
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7529
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303146
reference_id 2303146
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303146
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
reference_id mfsa2024-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
25
reference_url https://www.mozilla.org/security/advisories/mfsa2024-38/
reference_id mfsa2024-38
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-38/
26
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
27
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
28
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
29
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
30
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
31
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
32
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
33
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
34
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
35
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
36
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
37
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
38
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
39
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
40
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
41
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
42
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
43
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1903187
reference_id show_bug.cgi?id=1903187
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1903187
44
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
45
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-7529
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z6kw-szww-7feq
28
url VCID-zveb-b3t7-7yfg
vulnerability_id VCID-zveb-b3t7-7yfg
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7528.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7528.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7528
reference_id
reference_type
scores
0
value 0.00238
scoring_system epss
scoring_elements 0.46917
published_at 2026-04-18T12:55:00Z
1
value 0.00238
scoring_system epss
scoring_elements 0.4692
published_at 2026-04-16T12:55:00Z
2
value 0.00238
scoring_system epss
scoring_elements 0.46865
published_at 2026-04-13T12:55:00Z
3
value 0.00238
scoring_system epss
scoring_elements 0.46857
published_at 2026-04-12T12:55:00Z
4
value 0.00238
scoring_system epss
scoring_elements 0.46884
published_at 2026-04-11T12:55:00Z
5
value 0.00238
scoring_system epss
scoring_elements 0.46859
published_at 2026-04-04T12:55:00Z
6
value 0.00238
scoring_system epss
scoring_elements 0.46862
published_at 2026-04-08T12:55:00Z
7
value 0.00238
scoring_system epss
scoring_elements 0.46808
published_at 2026-04-07T12:55:00Z
8
value 0.00238
scoring_system epss
scoring_elements 0.46841
published_at 2026-04-02T12:55:00Z
9
value 0.00238
scoring_system epss
scoring_elements 0.46861
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7528
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303145
reference_id 2303145
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303145
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:09:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:09:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:09:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
13
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
14
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
15
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
16
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
17
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
18
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
19
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
20
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
21
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
22
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
23
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
24
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
25
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
26
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
27
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
28
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
29
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
30
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1895951
reference_id show_bug.cgi?id=1895951
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:09:03Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1895951
31
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
fixed_packages
0
url pkg:ebuild/dev-lang/spidermonkey@115.15.0
purl pkg:ebuild/dev-lang/spidermonkey@115.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0
aliases CVE-2024-7528
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zveb-b3t7-7yfg
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0