Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/75296?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "type": "ebuild", "namespace": "dev-lang", "name": "spidermonkey", "version": "115.15.0", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "128.8.0", "latest_non_vulnerable_version": "128.9.0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36106?format=api", "vulnerability_id": "VCID-2cuh-xyst-rbgv", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7518.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7518.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7518", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54849", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54872", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54841", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54891", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54888", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.549", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54883", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54859", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54897", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54899", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54879", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54854", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54874", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54848", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7518" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303135", "reference_id": "2303135", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303135" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-33/", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T17:58:37Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-33/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T17:58:37Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-37", "reference_id": "mfsa2024-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-37" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-37/", "reference_id": "mfsa2024-37", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T17:58:37Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-37/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5322", "reference_id": "RHSA-2024:5322", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5323", "reference_id": "RHSA-2024:5323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5324", "reference_id": "RHSA-2024:5324", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5324" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5325", "reference_id": "RHSA-2024:5325", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5326", "reference_id": "RHSA-2024:5326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5327", "reference_id": "RHSA-2024:5327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5328", "reference_id": "RHSA-2024:5328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5329", "reference_id": "RHSA-2024:5329", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5391", "reference_id": "RHSA-2024:5391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5392", "reference_id": "RHSA-2024:5392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5393", "reference_id": "RHSA-2024:5393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5394", "reference_id": "RHSA-2024:5394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5395", "reference_id": "RHSA-2024:5395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5396", "reference_id": "RHSA-2024:5396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5402", "reference_id": "RHSA-2024:5402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5527", "reference_id": "RHSA-2024:5527", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5527" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5528", "reference_id": "RHSA-2024:5528", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5528" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1875354", "reference_id": "show_bug.cgi?id=1875354", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T17:58:37Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1875354" }, { "reference_url": "https://usn.ubuntu.com/6966-1/", "reference_id": "USN-6966-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6966-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-7518" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2cuh-xyst-rbgv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36107?format=api", "vulnerability_id": "VCID-2pvz-3cmq-53dk", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7519.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7519.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7519", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58785", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.588", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58786", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58763", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58812", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58805", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58753", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58784", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58806", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58829", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58825", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58793", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.5883", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303136", "reference_id": "2303136", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303136" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-33/", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-33/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34", "reference_id": "mfsa2024-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-34/", "reference_id": "mfsa2024-34", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-37", "reference_id": "mfsa2024-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-37" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-37/", "reference_id": "mfsa2024-37", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-37/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-38", "reference_id": "mfsa2024-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-38/", "reference_id": "mfsa2024-38", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5322", "reference_id": "RHSA-2024:5322", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5323", "reference_id": "RHSA-2024:5323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5324", "reference_id": "RHSA-2024:5324", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5324" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5325", "reference_id": "RHSA-2024:5325", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5326", "reference_id": "RHSA-2024:5326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5327", "reference_id": "RHSA-2024:5327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5328", "reference_id": "RHSA-2024:5328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5329", "reference_id": "RHSA-2024:5329", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5391", "reference_id": "RHSA-2024:5391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5392", "reference_id": "RHSA-2024:5392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5393", "reference_id": "RHSA-2024:5393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5394", "reference_id": "RHSA-2024:5394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5395", "reference_id": "RHSA-2024:5395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5396", "reference_id": "RHSA-2024:5396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5402", "reference_id": "RHSA-2024:5402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5527", "reference_id": "RHSA-2024:5527", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5527" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5528", "reference_id": "RHSA-2024:5528", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5528" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1902307", "reference_id": "show_bug.cgi?id=1902307", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1902307" }, { "reference_url": "https://usn.ubuntu.com/6966-1/", "reference_id": "USN-6966-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6966-1/" }, { "reference_url": "https://usn.ubuntu.com/6995-1/", "reference_id": "USN-6995-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6995-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-7519" ], "risk_score": 4.3, "exploitability": "0.5", "weighted_severity": "8.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2pvz-3cmq-53dk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36122?format=api", "vulnerability_id": "VCID-3ayf-d2s1-67ff", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8382.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8382.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8382", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47401", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47461", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47509", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47517", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47457", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47451", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47476", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47456", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47431", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47452", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00267", "scoring_system": "epss", "scoring_elements": "0.50161", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00267", "scoring_system": "epss", "scoring_elements": "0.502", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00267", "scoring_system": "epss", "scoring_elements": "0.50206", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8382" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8382", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8382" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309428", "reference_id": "2309428", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309428" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-39", "reference_id": "mfsa2024-39", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-39" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-39/", "reference_id": "mfsa2024-39", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-39/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-40", "reference_id": "mfsa2024-40", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-40" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-40/", "reference_id": "mfsa2024-40", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-40/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-41", "reference_id": "mfsa2024-41", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-41" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-41/", "reference_id": "mfsa2024-41", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-41/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-43", "reference_id": "mfsa2024-43", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-43" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-43/", "reference_id": "mfsa2024-43", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-43/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-44", "reference_id": "mfsa2024-44", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-44" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-44/", "reference_id": "mfsa2024-44", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-44/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6681", "reference_id": "RHSA-2024:6681", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6681" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6682", "reference_id": "RHSA-2024:6682", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6682" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6683", "reference_id": "RHSA-2024:6683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6684", "reference_id": "RHSA-2024:6684", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6684" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6719", "reference_id": "RHSA-2024:6719", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6719" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6720", "reference_id": "RHSA-2024:6720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6721", "reference_id": "RHSA-2024:6721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6722", "reference_id": "RHSA-2024:6722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6723", "reference_id": "RHSA-2024:6723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6782", "reference_id": "RHSA-2024:6782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6786", "reference_id": "RHSA-2024:6786", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6786" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6816", "reference_id": "RHSA-2024:6816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6816" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6838", "reference_id": "RHSA-2024:6838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6838" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6839", "reference_id": "RHSA-2024:6839", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6839" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6850", "reference_id": "RHSA-2024:6850", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6850" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6891", "reference_id": "RHSA-2024:6891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6892", "reference_id": "RHSA-2024:6892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6892" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1906744", "reference_id": "show_bug.cgi?id=1906744", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1906744" }, { "reference_url": "https://usn.ubuntu.com/6992-1/", "reference_id": "USN-6992-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6992-1/" }, { "reference_url": "https://usn.ubuntu.com/6995-1/", "reference_id": "USN-6995-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6995-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-8382" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3ayf-d2s1-67ff" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36128?format=api", "vulnerability_id": "VCID-3sjh-f264-m3g7", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8387.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8387.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8387", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67773", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67668", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67688", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67669", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.6772", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67735", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67759", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67744", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.6771", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67746", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.6774", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.6776", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67771", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8387" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309433", "reference_id": "2309433", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309433" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1857607%2C1911858%2C1914009", "reference_id": "buglist.cgi?bug_id=1857607%2C1911858%2C1914009", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:41:12Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1857607%2C1911858%2C1914009" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-39", "reference_id": "mfsa2024-39", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-39" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-39/", "reference_id": "mfsa2024-39", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:41:12Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-39/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-40", "reference_id": "mfsa2024-40", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-40" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-40/", "reference_id": "mfsa2024-40", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:41:12Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-40/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-43", "reference_id": "mfsa2024-43", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-43" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-43/", "reference_id": "mfsa2024-43", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:41:12Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-43/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6681", "reference_id": "RHSA-2024:6681", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6681" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6682", "reference_id": "RHSA-2024:6682", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6682" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6683", "reference_id": "RHSA-2024:6683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6684", "reference_id": "RHSA-2024:6684", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6684" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6719", "reference_id": "RHSA-2024:6719", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6719" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6720", "reference_id": "RHSA-2024:6720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6721", "reference_id": "RHSA-2024:6721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6722", "reference_id": "RHSA-2024:6722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6723", "reference_id": "RHSA-2024:6723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6782", "reference_id": "RHSA-2024:6782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6786", "reference_id": "RHSA-2024:6786", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6786" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6816", "reference_id": "RHSA-2024:6816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6816" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6838", "reference_id": "RHSA-2024:6838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6838" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6839", "reference_id": "RHSA-2024:6839", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6839" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6850", "reference_id": "RHSA-2024:6850", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6850" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6891", "reference_id": "RHSA-2024:6891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6892", "reference_id": "RHSA-2024:6892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6892" }, { "reference_url": "https://usn.ubuntu.com/6992-1/", "reference_id": "USN-6992-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6992-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-8387" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3sjh-f264-m3g7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36111?format=api", "vulnerability_id": "VCID-4jfr-pz41-gfbz", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7523", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29847", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30151", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30166", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30147", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30103", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30032", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29917", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30279", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30329", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30143", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30203", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30238", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30241", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30198", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7523" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-33/", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:41:10Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-33/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1908344", "reference_id": "show_bug.cgi?id=1908344", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:41:10Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1908344" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-7523" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4jfr-pz41-gfbz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36130?format=api", "vulnerability_id": "VCID-62zr-8w1c-bydt", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8394.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8394.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8394", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58376", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58364", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58403", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58426", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58359", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58379", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58353", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58406", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58412", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58429", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58408", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58422", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58389", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60775", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8394" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310481", "reference_id": "2310481", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310481" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-43", "reference_id": "mfsa2024-43", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-43" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-43/", "reference_id": "mfsa2024-43", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-06T19:38:19Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-43/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6683", "reference_id": "RHSA-2024:6683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6684", "reference_id": "RHSA-2024:6684", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6684" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6719", "reference_id": "RHSA-2024:6719", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6719" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6720", "reference_id": "RHSA-2024:6720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6721", "reference_id": "RHSA-2024:6721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6722", "reference_id": "RHSA-2024:6722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6723", "reference_id": "RHSA-2024:6723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6816", "reference_id": "RHSA-2024:6816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6816" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895737", "reference_id": "show_bug.cgi?id=1895737", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-06T19:38:19Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895737" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-8394" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-62zr-8w1c-bydt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36116?format=api", "vulnerability_id": "VCID-957q-jagj-9kg7", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7527.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7527.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7527", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.46952", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.47002", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.46991", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.46981", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.46998", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.47001", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.46947", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.46999", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.47004", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.47055", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.47059", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.47003", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.46996", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.47023", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7527" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303144", "reference_id": "2303144", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303144" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-33/", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-33/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34", "reference_id": "mfsa2024-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-34/", "reference_id": "mfsa2024-34", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-37", "reference_id": "mfsa2024-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-37" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-37/", "reference_id": "mfsa2024-37", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-37/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-38", "reference_id": "mfsa2024-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-38/", "reference_id": "mfsa2024-38", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5322", "reference_id": "RHSA-2024:5322", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5323", "reference_id": "RHSA-2024:5323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5324", "reference_id": "RHSA-2024:5324", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5324" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5325", "reference_id": "RHSA-2024:5325", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5326", "reference_id": "RHSA-2024:5326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5327", "reference_id": "RHSA-2024:5327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5328", "reference_id": "RHSA-2024:5328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5329", "reference_id": "RHSA-2024:5329", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5391", "reference_id": "RHSA-2024:5391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5392", "reference_id": "RHSA-2024:5392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5393", "reference_id": "RHSA-2024:5393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5394", "reference_id": "RHSA-2024:5394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5395", "reference_id": "RHSA-2024:5395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5396", "reference_id": "RHSA-2024:5396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5402", "reference_id": "RHSA-2024:5402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5527", "reference_id": "RHSA-2024:5527", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5527" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5528", "reference_id": "RHSA-2024:5528", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5528" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871303", "reference_id": "show_bug.cgi?id=1871303", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871303" }, { "reference_url": "https://usn.ubuntu.com/6966-1/", "reference_id": "USN-6966-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6966-1/" }, { "reference_url": "https://usn.ubuntu.com/6995-1/", "reference_id": "USN-6995-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6995-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-7527" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-957q-jagj-9kg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36099?format=api", "vulnerability_id": "VCID-b9aw-u5wp-6uhk", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5693.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5693.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5693", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.8093", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80956", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80871", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80894", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80891", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80919", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80928", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80944", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80921", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80999", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80987", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80979", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80959", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0147", "scoring_system": "epss", "scoring_elements": "0.80958", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5693" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291399", "reference_id": "2291399", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291399" }, { "reference_url": "https://security.gentoo.org/glsa/202408-02", "reference_id": "GLSA-202408-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202408-02" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-25", "reference_id": "mfsa2024-25", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-25" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-25/", "reference_id": "mfsa2024-25", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-25/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-26", "reference_id": "mfsa2024-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-26" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", "reference_id": "mfsa2024-26", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-28", "reference_id": "mfsa2024-28", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-28" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", "reference_id": "mfsa2024-28", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3949", "reference_id": "RHSA-2024:3949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3950", "reference_id": "RHSA-2024:3950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3951", "reference_id": "RHSA-2024:3951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3952", "reference_id": "RHSA-2024:3952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3953", "reference_id": "RHSA-2024:3953", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3953" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3954", "reference_id": "RHSA-2024:3954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3955", "reference_id": "RHSA-2024:3955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3958", "reference_id": "RHSA-2024:3958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3972", "reference_id": "RHSA-2024:3972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4001", "reference_id": "RHSA-2024:4001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4002", "reference_id": "RHSA-2024:4002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4003", "reference_id": "RHSA-2024:4003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4004", "reference_id": "RHSA-2024:4004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4015", "reference_id": "RHSA-2024:4015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4016", "reference_id": "RHSA-2024:4016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4018", "reference_id": "RHSA-2024:4018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4036", "reference_id": "RHSA-2024:4036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4036" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4063", "reference_id": "RHSA-2024:4063", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4063" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1891319", "reference_id": "show_bug.cgi?id=1891319", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:39Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1891319" }, { "reference_url": "https://usn.ubuntu.com/6840-1/", "reference_id": "USN-6840-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6840-1/" }, { "reference_url": "https://usn.ubuntu.com/6862-1/", "reference_id": "USN-6862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6862-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-5693" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b9aw-u5wp-6uhk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36101?format=api", "vulnerability_id": "VCID-bshu-jxhj-27b8", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5700.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5700.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5700", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38199", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.3822", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38265", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38288", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38156", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38207", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38215", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38234", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38175", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.37844", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.37939", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.37962", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38136", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38201", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291401", "reference_id": "2291401", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291401" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1862809%2C1889355%2C1893388%2C1895123", "reference_id": "buglist.cgi?bug_id=1862809%2C1889355%2C1893388%2C1895123", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1862809%2C1889355%2C1893388%2C1895123" }, { "reference_url": "https://security.gentoo.org/glsa/202408-02", "reference_id": "GLSA-202408-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202408-02" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-25", "reference_id": "mfsa2024-25", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-25" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-25/", "reference_id": "mfsa2024-25", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-25/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-26", "reference_id": "mfsa2024-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-26" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", "reference_id": "mfsa2024-26", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-28", "reference_id": "mfsa2024-28", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-28" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", "reference_id": "mfsa2024-28", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-11T16:16:36Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3949", "reference_id": "RHSA-2024:3949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3950", "reference_id": "RHSA-2024:3950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3951", "reference_id": "RHSA-2024:3951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3952", "reference_id": "RHSA-2024:3952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3953", "reference_id": "RHSA-2024:3953", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3953" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3954", "reference_id": "RHSA-2024:3954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3955", "reference_id": "RHSA-2024:3955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3958", "reference_id": "RHSA-2024:3958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3972", "reference_id": "RHSA-2024:3972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4001", "reference_id": "RHSA-2024:4001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4002", "reference_id": "RHSA-2024:4002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4003", "reference_id": "RHSA-2024:4003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4004", "reference_id": "RHSA-2024:4004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4015", "reference_id": "RHSA-2024:4015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4016", "reference_id": "RHSA-2024:4016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4018", "reference_id": "RHSA-2024:4018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4036", "reference_id": "RHSA-2024:4036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4036" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4063", "reference_id": "RHSA-2024:4063", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4063" }, { "reference_url": "https://usn.ubuntu.com/6840-1/", "reference_id": "USN-6840-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6840-1/" }, { "reference_url": "https://usn.ubuntu.com/6862-1/", "reference_id": "USN-6862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6862-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-5700" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bshu-jxhj-27b8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36112?format=api", "vulnerability_id": "VCID-cmr4-6stm-jfe9", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7524.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7524.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7524", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53011", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.5302", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.52987", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53038", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53032", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53081", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53066", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53049", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53086", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53093", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53075", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53042", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53051", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.52996", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303141", "reference_id": "2303141", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303141" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-33/", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T20:09:21Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-33/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34", "reference_id": "mfsa2024-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-34/", "reference_id": "mfsa2024-34", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T20:09:21Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T20:09:21Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5322", "reference_id": "RHSA-2024:5322", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5323", "reference_id": "RHSA-2024:5323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5324", "reference_id": "RHSA-2024:5324", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5324" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5325", "reference_id": "RHSA-2024:5325", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5326", "reference_id": "RHSA-2024:5326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5327", "reference_id": "RHSA-2024:5327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5328", "reference_id": "RHSA-2024:5328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5329", "reference_id": "RHSA-2024:5329", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5391", "reference_id": "RHSA-2024:5391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5391" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909241", "reference_id": "show_bug.cgi?id=1909241", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T20:09:21Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909241" }, { "reference_url": "https://usn.ubuntu.com/6966-1/", "reference_id": "USN-6966-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6966-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-7524" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cmr4-6stm-jfe9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36108?format=api", "vulnerability_id": "VCID-drjc-gxrt-q7ha", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7520.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7520.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7520", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.71027", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70889", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70907", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70882", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70926", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70941", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70964", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70948", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70932", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70978", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70986", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.71019", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.71028", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7520" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303137", "reference_id": "2303137", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303137" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-33/", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:23:43Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-33/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:23:43Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-37", "reference_id": "mfsa2024-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-37" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-37/", "reference_id": "mfsa2024-37", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:23:43Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-37/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5322", "reference_id": "RHSA-2024:5322", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5323", "reference_id": "RHSA-2024:5323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5324", "reference_id": "RHSA-2024:5324", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5324" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5325", "reference_id": "RHSA-2024:5325", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5326", "reference_id": "RHSA-2024:5326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5327", "reference_id": "RHSA-2024:5327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5328", "reference_id": "RHSA-2024:5328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5329", "reference_id": "RHSA-2024:5329", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5391", "reference_id": "RHSA-2024:5391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5392", "reference_id": "RHSA-2024:5392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5393", "reference_id": "RHSA-2024:5393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5394", "reference_id": "RHSA-2024:5394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5395", "reference_id": "RHSA-2024:5395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5396", "reference_id": "RHSA-2024:5396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5402", "reference_id": "RHSA-2024:5402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5527", "reference_id": "RHSA-2024:5527", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5527" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5528", "reference_id": "RHSA-2024:5528", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5528" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1903041", "reference_id": "show_bug.cgi?id=1903041", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:23:43Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1903041" }, { "reference_url": "https://usn.ubuntu.com/6966-1/", "reference_id": "USN-6966-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6966-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-7520" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-drjc-gxrt-q7ha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36102?format=api", "vulnerability_id": "VCID-frvc-mqhd-eydh", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6601.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6601.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6601", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29343", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29407", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29521", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29784", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29646", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.2983", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29602", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29647", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29669", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29651", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29703", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29747", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29745", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29708", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296636", "reference_id": "2296636", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296636" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29", "reference_id": "mfsa2024-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", "reference_id": "mfsa2024-29", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:21:13Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-30", "reference_id": "mfsa2024-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-30/", "reference_id": "mfsa2024-30", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:21:13Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-31", "reference_id": "mfsa2024-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-31/", "reference_id": "mfsa2024-31", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:21:13Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32", "reference_id": "mfsa2024-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", "reference_id": "mfsa2024-32", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:21:13Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4500", "reference_id": "RHSA-2024:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4501", "reference_id": "RHSA-2024:4501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4508", "reference_id": "RHSA-2024:4508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4517", "reference_id": "RHSA-2024:4517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4586", "reference_id": "RHSA-2024:4586", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4586" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4590", "reference_id": "RHSA-2024:4590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4610", "reference_id": "RHSA-2024:4610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4624", "reference_id": "RHSA-2024:4624", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4624" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4625", "reference_id": "RHSA-2024:4625", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4625" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4634", "reference_id": "RHSA-2024:4634", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4634" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4635", "reference_id": "RHSA-2024:4635", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4635" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4670", "reference_id": "RHSA-2024:4670", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4670" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4671", "reference_id": "RHSA-2024:4671", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4671" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4673", "reference_id": "RHSA-2024:4673", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4673" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4717", "reference_id": "RHSA-2024:4717", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4717" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4718", "reference_id": "RHSA-2024:4718", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4718" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4894", "reference_id": "RHSA-2024:4894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4894" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1890748", "reference_id": "show_bug.cgi?id=1890748", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:21:13Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1890748" }, { "reference_url": "https://usn.ubuntu.com/6890-1/", "reference_id": "USN-6890-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6890-1/" }, { "reference_url": "https://usn.ubuntu.com/6903-1/", "reference_id": "USN-6903-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6903-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-6601" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-frvc-mqhd-eydh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36100?format=api", "vulnerability_id": "VCID-gpjz-649k-f3he", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5696.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5696.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5696", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.83953", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.83967", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.83943", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.83888", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.83904", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.83907", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.8393", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.83937", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.83947", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.84008", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.84003", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.83995", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02069", "scoring_system": "epss", "scoring_elements": "0.83969", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291400", "reference_id": "2291400", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291400" }, { "reference_url": "https://security.gentoo.org/glsa/202408-02", "reference_id": "GLSA-202408-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202408-02" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-25", "reference_id": "mfsa2024-25", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-25" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-25/", "reference_id": "mfsa2024-25", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-25/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-26", "reference_id": "mfsa2024-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-26" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", "reference_id": "mfsa2024-26", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-28", "reference_id": "mfsa2024-28", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-28" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", "reference_id": "mfsa2024-28", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3949", "reference_id": "RHSA-2024:3949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3950", "reference_id": "RHSA-2024:3950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3951", "reference_id": "RHSA-2024:3951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3952", "reference_id": "RHSA-2024:3952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3953", "reference_id": "RHSA-2024:3953", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3953" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3954", "reference_id": "RHSA-2024:3954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3955", "reference_id": "RHSA-2024:3955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3958", "reference_id": "RHSA-2024:3958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3972", "reference_id": "RHSA-2024:3972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4001", "reference_id": "RHSA-2024:4001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4002", "reference_id": "RHSA-2024:4002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4003", "reference_id": "RHSA-2024:4003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4004", "reference_id": "RHSA-2024:4004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4015", "reference_id": "RHSA-2024:4015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4016", "reference_id": "RHSA-2024:4016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4018", "reference_id": "RHSA-2024:4018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4036", "reference_id": "RHSA-2024:4036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4036" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4063", "reference_id": "RHSA-2024:4063", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4063" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1896555", "reference_id": "show_bug.cgi?id=1896555", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:40Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1896555" }, { "reference_url": "https://usn.ubuntu.com/6840-1/", "reference_id": "USN-6840-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6840-1/" }, { "reference_url": "https://usn.ubuntu.com/6862-1/", "reference_id": "USN-6862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6862-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-5696" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gpjz-649k-f3he" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36119?format=api", "vulnerability_id": "VCID-gret-hn3p-5kbk", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7531.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7531.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7531", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19124", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19549", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19266", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19345", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19397", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19402", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19353", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19297", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19259", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19267", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19277", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19177", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19166", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19502", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303148", "reference_id": "2303148", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303148" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-33/", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-16T16:06:38Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-33/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34", "reference_id": "mfsa2024-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-34/", "reference_id": "mfsa2024-34", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-16T16:06:38Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-16T16:06:38Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6839", "reference_id": "RHSA-2024:6839", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6839" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1905691", "reference_id": "show_bug.cgi?id=1905691", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-16T16:06:38Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1905691" }, { "reference_url": "https://usn.ubuntu.com/6966-1/", "reference_id": "USN-6966-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6966-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-7531" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gret-hn3p-5kbk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36125?format=api", "vulnerability_id": "VCID-hetc-sghb-1fcx", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8384.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8384.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8384", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55177", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55241", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55199", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55218", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55237", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55226", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55176", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55201", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55148", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55157", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.5522", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8384" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309430", "reference_id": "2309430", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309430" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-39", "reference_id": "mfsa2024-39", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-39" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-39/", "reference_id": "mfsa2024-39", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-39/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-40", "reference_id": "mfsa2024-40", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-40" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-40/", "reference_id": "mfsa2024-40", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-40/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-41", "reference_id": "mfsa2024-41", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-41" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-41/", "reference_id": "mfsa2024-41", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-41/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-43", "reference_id": "mfsa2024-43", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-43" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-43/", "reference_id": "mfsa2024-43", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-43/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-44", "reference_id": "mfsa2024-44", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-44" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-44/", "reference_id": "mfsa2024-44", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-44/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6681", "reference_id": "RHSA-2024:6681", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6681" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6682", "reference_id": "RHSA-2024:6682", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6682" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6683", "reference_id": "RHSA-2024:6683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6684", "reference_id": "RHSA-2024:6684", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6684" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6719", "reference_id": "RHSA-2024:6719", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6719" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6720", "reference_id": "RHSA-2024:6720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6721", "reference_id": "RHSA-2024:6721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6722", "reference_id": "RHSA-2024:6722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6723", "reference_id": "RHSA-2024:6723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6782", "reference_id": "RHSA-2024:6782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6786", "reference_id": "RHSA-2024:6786", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6786" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6816", "reference_id": "RHSA-2024:6816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6816" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6838", "reference_id": "RHSA-2024:6838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6838" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6839", "reference_id": "RHSA-2024:6839", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6839" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6850", "reference_id": "RHSA-2024:6850", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6850" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6891", "reference_id": "RHSA-2024:6891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6892", "reference_id": "RHSA-2024:6892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6892" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1911288", "reference_id": "show_bug.cgi?id=1911288", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1911288" }, { "reference_url": "https://usn.ubuntu.com/6992-1/", "reference_id": "USN-6992-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6992-1/" }, { "reference_url": "https://usn.ubuntu.com/6995-1/", "reference_id": "USN-6995-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6995-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-8384" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hetc-sghb-1fcx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36124?format=api", "vulnerability_id": "VCID-jt6f-rpfx-7kbj", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8383.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8383.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8383", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44802", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.4496", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44901", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44953", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44954", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44976", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44944", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44946", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44997", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44991", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44942", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.4485", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44859", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44939", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8383" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309429", "reference_id": "2309429", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309429" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-39", "reference_id": "mfsa2024-39", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-39" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-39/", "reference_id": "mfsa2024-39", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-30T16:16:58Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-39/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-40", "reference_id": "mfsa2024-40", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-40" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-40/", "reference_id": "mfsa2024-40", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-30T16:16:58Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-40/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-41", "reference_id": "mfsa2024-41", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-41" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-41/", "reference_id": "mfsa2024-41", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-30T16:16:58Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-41/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6681", "reference_id": "RHSA-2024:6681", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6681" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6682", "reference_id": "RHSA-2024:6682", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6682" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6782", "reference_id": "RHSA-2024:6782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6786", "reference_id": "RHSA-2024:6786", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6786" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6838", "reference_id": "RHSA-2024:6838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6838" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6839", "reference_id": "RHSA-2024:6839", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6839" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6850", "reference_id": "RHSA-2024:6850", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6850" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6891", "reference_id": "RHSA-2024:6891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6892", "reference_id": "RHSA-2024:6892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6892" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1908496", "reference_id": "show_bug.cgi?id=1908496", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-30T16:16:58Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1908496" }, { "reference_url": "https://usn.ubuntu.com/6992-1/", "reference_id": "USN-6992-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6992-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-8383" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jt6f-rpfx-7kbj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36129?format=api", "vulnerability_id": "VCID-mj7u-bpwq-jkhu", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8389.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8389.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8389", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72552", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72464", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72506", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72514", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72504", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72547", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72554", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72423", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.7244", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72417", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72456", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72468", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72492", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72474", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8389" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309435", "reference_id": "2309435", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309435" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1907230%2C1909367", "reference_id": "buglist.cgi?bug_id=1907230%2C1909367", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:39:40Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1907230%2C1909367" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-39", "reference_id": "mfsa2024-39", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-39" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-39/", "reference_id": "mfsa2024-39", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:39:40Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-39/" }, { "reference_url": "https://usn.ubuntu.com/6992-1/", "reference_id": "USN-6992-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6992-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-8389" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mj7u-bpwq-jkhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36127?format=api", "vulnerability_id": "VCID-pst5-367g-h7cs", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8386.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8386.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8386", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50595", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50605", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50627", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50622", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.5058", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50543", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.5057", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50523", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50578", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50575", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50617", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53295", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53258", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53285", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8386" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309432", "reference_id": "2309432", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309432" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-39", "reference_id": "mfsa2024-39", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-39" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-39/", "reference_id": "mfsa2024-39", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-39/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-40", "reference_id": "mfsa2024-40", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-40" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-40/", "reference_id": "mfsa2024-40", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-40/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-43", "reference_id": "mfsa2024-43", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-43" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-43/", "reference_id": "mfsa2024-43", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-43/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6681", "reference_id": "RHSA-2024:6681", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6681" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6682", "reference_id": "RHSA-2024:6682", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6682" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6683", "reference_id": "RHSA-2024:6683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6684", "reference_id": "RHSA-2024:6684", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6684" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6719", "reference_id": "RHSA-2024:6719", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6719" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6720", "reference_id": "RHSA-2024:6720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6721", "reference_id": "RHSA-2024:6721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6722", "reference_id": "RHSA-2024:6722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6723", "reference_id": "RHSA-2024:6723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6782", "reference_id": "RHSA-2024:6782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6786", "reference_id": "RHSA-2024:6786", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6786" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6816", "reference_id": "RHSA-2024:6816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6816" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6838", "reference_id": "RHSA-2024:6838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6838" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6839", "reference_id": "RHSA-2024:6839", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6839" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6850", "reference_id": "RHSA-2024:6850", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6850" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6891", "reference_id": "RHSA-2024:6891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6892", "reference_id": "RHSA-2024:6892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6892" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1907032", "reference_id": "show_bug.cgi?id=1907032", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1907032" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909163", "reference_id": "show_bug.cgi?id=1909163", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909163" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909529", "reference_id": "show_bug.cgi?id=1909529", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909529" }, { "reference_url": "https://usn.ubuntu.com/6992-1/", "reference_id": "USN-6992-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6992-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-8386" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pst5-367g-h7cs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36126?format=api", "vulnerability_id": "VCID-qd97-asaa-2fey", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8385.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8385.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8385", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51202", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51181", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51206", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51164", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51219", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51216", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51259", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51238", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51224", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51262", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51269", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51247", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51195", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8385" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309431", "reference_id": "2309431", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309431" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-39", "reference_id": "mfsa2024-39", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-39" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-39/", "reference_id": "mfsa2024-39", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:46:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-39/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-40", "reference_id": "mfsa2024-40", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-40" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-40/", "reference_id": "mfsa2024-40", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:46:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-40/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-43", "reference_id": "mfsa2024-43", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-43" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-43/", "reference_id": "mfsa2024-43", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:46:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-43/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6681", "reference_id": "RHSA-2024:6681", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6681" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6682", "reference_id": "RHSA-2024:6682", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6682" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6683", "reference_id": "RHSA-2024:6683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6684", "reference_id": "RHSA-2024:6684", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6684" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6719", "reference_id": "RHSA-2024:6719", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6719" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6720", "reference_id": "RHSA-2024:6720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6721", "reference_id": "RHSA-2024:6721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6722", "reference_id": "RHSA-2024:6722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6723", "reference_id": "RHSA-2024:6723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6782", "reference_id": "RHSA-2024:6782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6786", "reference_id": "RHSA-2024:6786", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6786" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6816", "reference_id": "RHSA-2024:6816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6816" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6838", "reference_id": "RHSA-2024:6838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6838" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6839", "reference_id": "RHSA-2024:6839", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6839" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6850", "reference_id": "RHSA-2024:6850", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6850" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6891", "reference_id": "RHSA-2024:6891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6892", "reference_id": "RHSA-2024:6892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6892" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1911909", "reference_id": "show_bug.cgi?id=1911909", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:46:49Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1911909" }, { "reference_url": "https://usn.ubuntu.com/6992-1/", "reference_id": "USN-6992-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6992-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-8385" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qd97-asaa-2fey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36110?format=api", "vulnerability_id": "VCID-s556-eg79-77gu", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7522.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7522.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7522", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47888", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47941", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.4793", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47914", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47931", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47936", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47884", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47935", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47947", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47992", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47997", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47942", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47933", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47955", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303139", "reference_id": "2303139", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303139" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-33/", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-33/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34", "reference_id": "mfsa2024-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-34/", "reference_id": "mfsa2024-34", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-37", "reference_id": "mfsa2024-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-37" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-37/", "reference_id": "mfsa2024-37", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-37/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-38", "reference_id": "mfsa2024-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-38/", "reference_id": "mfsa2024-38", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5322", "reference_id": "RHSA-2024:5322", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5323", "reference_id": "RHSA-2024:5323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5324", "reference_id": "RHSA-2024:5324", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5324" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5325", "reference_id": "RHSA-2024:5325", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5326", "reference_id": "RHSA-2024:5326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5327", "reference_id": "RHSA-2024:5327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5328", "reference_id": "RHSA-2024:5328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5329", "reference_id": "RHSA-2024:5329", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5391", "reference_id": "RHSA-2024:5391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5392", "reference_id": "RHSA-2024:5392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5393", "reference_id": "RHSA-2024:5393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5394", "reference_id": "RHSA-2024:5394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5395", "reference_id": "RHSA-2024:5395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5396", "reference_id": "RHSA-2024:5396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5402", "reference_id": "RHSA-2024:5402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5527", "reference_id": "RHSA-2024:5527", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5527" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5528", "reference_id": "RHSA-2024:5528", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5528" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1906727", "reference_id": "show_bug.cgi?id=1906727", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1906727" }, { "reference_url": "https://usn.ubuntu.com/6966-1/", "reference_id": "USN-6966-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6966-1/" }, { "reference_url": "https://usn.ubuntu.com/6995-1/", "reference_id": "USN-6995-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6995-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-7522" ], "risk_score": 4.1, "exploitability": "0.5", "weighted_severity": "8.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s556-eg79-77gu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36104?format=api", "vulnerability_id": "VCID-svqy-5b6h-7yfj", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6603.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6603.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6603", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57005", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57023", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57069", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.571", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57098", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57048", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57047", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57003", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57068", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57095", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57067", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.5709", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57111", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296638", "reference_id": "2296638", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296638" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29", "reference_id": "mfsa2024-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", "reference_id": "mfsa2024-29", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T15:12:02Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-30", "reference_id": "mfsa2024-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-30/", "reference_id": "mfsa2024-30", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T15:12:02Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-31", "reference_id": "mfsa2024-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-31/", "reference_id": "mfsa2024-31", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T15:12:02Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32", "reference_id": "mfsa2024-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", "reference_id": "mfsa2024-32", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T15:12:02Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4500", "reference_id": "RHSA-2024:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4501", "reference_id": "RHSA-2024:4501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4508", "reference_id": "RHSA-2024:4508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4517", "reference_id": "RHSA-2024:4517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4586", "reference_id": "RHSA-2024:4586", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4586" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4590", "reference_id": "RHSA-2024:4590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4610", "reference_id": "RHSA-2024:4610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4624", "reference_id": "RHSA-2024:4624", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4624" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4625", "reference_id": "RHSA-2024:4625", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4625" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4634", "reference_id": "RHSA-2024:4634", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4634" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4635", "reference_id": "RHSA-2024:4635", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4635" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4670", "reference_id": "RHSA-2024:4670", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4670" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4671", "reference_id": "RHSA-2024:4671", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4671" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4673", "reference_id": "RHSA-2024:4673", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4673" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4717", "reference_id": "RHSA-2024:4717", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4717" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4718", "reference_id": "RHSA-2024:4718", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4718" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4894", "reference_id": "RHSA-2024:4894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4894" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895081", "reference_id": "show_bug.cgi?id=1895081", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T15:12:02Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895081" }, { "reference_url": "https://usn.ubuntu.com/6890-1/", "reference_id": "USN-6890-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6890-1/" }, { "reference_url": "https://usn.ubuntu.com/6903-1/", "reference_id": "USN-6903-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6903-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-6603" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-svqy-5b6h-7yfj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36105?format=api", "vulnerability_id": "VCID-t52p-7rr7-57ax", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6604.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6604.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6604", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59488", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59502", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59481", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59447", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59439", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59472", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59509", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59526", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.5952", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59486", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59506", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59522", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59503", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.5949", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6604" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296639", "reference_id": "2296639", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296639" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1748105%2C1837550%2C1884266", "reference_id": "buglist.cgi?bug_id=1748105%2C1837550%2C1884266", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:20:14Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1748105%2C1837550%2C1884266" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29", "reference_id": "mfsa2024-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", "reference_id": "mfsa2024-29", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:20:14Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-30", "reference_id": "mfsa2024-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-30/", "reference_id": "mfsa2024-30", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:20:14Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-31", "reference_id": "mfsa2024-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-31/", "reference_id": "mfsa2024-31", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:20:14Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32", "reference_id": "mfsa2024-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", "reference_id": "mfsa2024-32", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:20:14Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4500", "reference_id": "RHSA-2024:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4501", "reference_id": "RHSA-2024:4501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4508", "reference_id": "RHSA-2024:4508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4517", "reference_id": "RHSA-2024:4517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4586", "reference_id": "RHSA-2024:4586", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4586" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4590", "reference_id": "RHSA-2024:4590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4610", "reference_id": "RHSA-2024:4610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4624", "reference_id": "RHSA-2024:4624", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4624" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4625", "reference_id": "RHSA-2024:4625", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4625" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4634", "reference_id": "RHSA-2024:4634", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4634" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4635", "reference_id": "RHSA-2024:4635", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4635" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4670", "reference_id": "RHSA-2024:4670", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4670" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4671", "reference_id": "RHSA-2024:4671", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4671" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4673", "reference_id": "RHSA-2024:4673", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4673" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4717", "reference_id": "RHSA-2024:4717", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4717" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4718", "reference_id": "RHSA-2024:4718", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4718" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4894", "reference_id": "RHSA-2024:4894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4894" }, { "reference_url": "https://usn.ubuntu.com/6890-1/", "reference_id": "USN-6890-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6890-1/" }, { "reference_url": "https://usn.ubuntu.com/6903-1/", "reference_id": "USN-6903-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6903-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-6604" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t52p-7rr7-57ax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36109?format=api", "vulnerability_id": "VCID-tegn-2y58-t3de", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7521.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7521.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7521", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00261", "scoring_system": "epss", "scoring_elements": "0.494", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00261", "scoring_system": "epss", "scoring_elements": "0.49434", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00261", "scoring_system": "epss", "scoring_elements": "0.49444", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00261", "scoring_system": "epss", "scoring_elements": "0.49411", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00261", "scoring_system": "epss", "scoring_elements": "0.49441", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00261", "scoring_system": "epss", "scoring_elements": "0.49445", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00261", "scoring_system": "epss", "scoring_elements": "0.49391", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00261", "scoring_system": "epss", "scoring_elements": "0.49437", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00261", "scoring_system": "epss", "scoring_elements": "0.49475", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00261", "scoring_system": "epss", "scoring_elements": "0.49477", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00261", "scoring_system": "epss", "scoring_elements": "0.49431", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00261", "scoring_system": "epss", "scoring_elements": "0.49429", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00261", "scoring_system": "epss", "scoring_elements": "0.49458", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303138", "reference_id": "2303138", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303138" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-33/", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-33/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34", "reference_id": "mfsa2024-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-34/", "reference_id": "mfsa2024-34", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-37", "reference_id": "mfsa2024-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-37" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-37/", "reference_id": "mfsa2024-37", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-37/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-38", "reference_id": "mfsa2024-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-38/", "reference_id": "mfsa2024-38", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5322", "reference_id": "RHSA-2024:5322", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5323", "reference_id": "RHSA-2024:5323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5324", "reference_id": "RHSA-2024:5324", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5324" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5325", "reference_id": "RHSA-2024:5325", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5326", "reference_id": "RHSA-2024:5326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5327", "reference_id": "RHSA-2024:5327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5328", "reference_id": "RHSA-2024:5328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5329", "reference_id": "RHSA-2024:5329", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5391", "reference_id": "RHSA-2024:5391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5392", "reference_id": "RHSA-2024:5392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5393", "reference_id": "RHSA-2024:5393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5394", "reference_id": "RHSA-2024:5394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5395", "reference_id": "RHSA-2024:5395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5396", "reference_id": "RHSA-2024:5396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5402", "reference_id": "RHSA-2024:5402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5527", "reference_id": "RHSA-2024:5527", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5527" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5528", "reference_id": "RHSA-2024:5528", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5528" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1904644", "reference_id": "show_bug.cgi?id=1904644", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1904644" }, { "reference_url": "https://usn.ubuntu.com/6966-1/", "reference_id": "USN-6966-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6966-1/" }, { "reference_url": "https://usn.ubuntu.com/6995-1/", "reference_id": "USN-6995-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6995-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-7521" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tegn-2y58-t3de" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36121?format=api", "vulnerability_id": "VCID-ux24-3d83-23c6", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8381.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8381.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8381", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11622", "scoring_system": "epss", "scoring_elements": "0.93646", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11622", "scoring_system": "epss", "scoring_elements": "0.93648", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11622", "scoring_system": "epss", "scoring_elements": "0.93653", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11622", "scoring_system": "epss", "scoring_elements": "0.93654", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11622", "scoring_system": "epss", "scoring_elements": "0.93672", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.11622", "scoring_system": "epss", "scoring_elements": "0.93679", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.11622", "scoring_system": "epss", "scoring_elements": "0.93683", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.11622", "scoring_system": "epss", "scoring_elements": "0.93685", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.11622", "scoring_system": "epss", "scoring_elements": "0.93682", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.11622", "scoring_system": "epss", "scoring_elements": "0.93687", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.12468", "scoring_system": "epss", "scoring_elements": "0.93891", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12468", "scoring_system": "epss", "scoring_elements": "0.93882", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12468", "scoring_system": "epss", "scoring_elements": "0.93895", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8381" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309427", "reference_id": "2309427", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309427" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-39", "reference_id": "mfsa2024-39", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-39" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-39/", "reference_id": "mfsa2024-39", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-39/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-40", "reference_id": "mfsa2024-40", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-40" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-40/", "reference_id": "mfsa2024-40", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-40/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-41", "reference_id": "mfsa2024-41", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-41" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-41/", "reference_id": "mfsa2024-41", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-41/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-43", "reference_id": "mfsa2024-43", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-43" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-43/", "reference_id": "mfsa2024-43", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-43/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-44", "reference_id": "mfsa2024-44", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-44" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-44/", "reference_id": "mfsa2024-44", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-44/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6681", "reference_id": "RHSA-2024:6681", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6681" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6682", "reference_id": "RHSA-2024:6682", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6682" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6683", "reference_id": "RHSA-2024:6683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6684", "reference_id": "RHSA-2024:6684", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6684" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6719", "reference_id": "RHSA-2024:6719", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6719" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6720", "reference_id": "RHSA-2024:6720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6721", "reference_id": "RHSA-2024:6721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6722", "reference_id": "RHSA-2024:6722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6723", "reference_id": "RHSA-2024:6723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6782", "reference_id": "RHSA-2024:6782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6786", "reference_id": "RHSA-2024:6786", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6786" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6816", "reference_id": "RHSA-2024:6816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6816" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6838", "reference_id": "RHSA-2024:6838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6838" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6839", "reference_id": "RHSA-2024:6839", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6839" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6850", "reference_id": "RHSA-2024:6850", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6850" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6891", "reference_id": "RHSA-2024:6891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6892", "reference_id": "RHSA-2024:6892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6892" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1912715", "reference_id": "show_bug.cgi?id=1912715", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1912715" }, { "reference_url": "https://usn.ubuntu.com/6992-1/", "reference_id": "USN-6992-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6992-1/" }, { "reference_url": "https://usn.ubuntu.com/6995-1/", "reference_id": "USN-6995-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6995-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-8381" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ux24-3d83-23c6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36103?format=api", "vulnerability_id": "VCID-w794-gqex-83du", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6602.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6602.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6602", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00768", "scoring_system": "epss", "scoring_elements": "0.73577", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00768", "scoring_system": "epss", "scoring_elements": "0.73578", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00768", "scoring_system": "epss", "scoring_elements": "0.73567", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00768", "scoring_system": "epss", "scoring_elements": "0.73534", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00768", "scoring_system": "epss", "scoring_elements": "0.73541", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00768", "scoring_system": "epss", "scoring_elements": "0.73471", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00768", "scoring_system": "epss", "scoring_elements": "0.73443", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00768", "scoring_system": "epss", "scoring_elements": "0.73448", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00768", "scoring_system": "epss", "scoring_elements": "0.73532", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00768", "scoring_system": "epss", "scoring_elements": "0.7349", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00768", "scoring_system": "epss", "scoring_elements": "0.73497", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00768", "scoring_system": "epss", "scoring_elements": "0.73517", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00768", "scoring_system": "epss", "scoring_elements": "0.73493", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00768", "scoring_system": "epss", "scoring_elements": "0.7348", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296637", "reference_id": "2296637", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296637" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29", "reference_id": "mfsa2024-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", "reference_id": "mfsa2024-29", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-30", "reference_id": "mfsa2024-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-30/", "reference_id": "mfsa2024-30", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-31", "reference_id": "mfsa2024-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-31/", "reference_id": "mfsa2024-31", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32", "reference_id": "mfsa2024-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", "reference_id": "mfsa2024-32", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4625", "reference_id": "RHSA-2024:4625", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4625" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4670", "reference_id": "RHSA-2024:4670", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4670" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4671", "reference_id": "RHSA-2024:4671", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4671" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4717", "reference_id": "RHSA-2024:4717", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4717" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4718", "reference_id": "RHSA-2024:4718", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4718" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4894", "reference_id": "RHSA-2024:4894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6839", "reference_id": "RHSA-2024:6839", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6839" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895032", "reference_id": "show_bug.cgi?id=1895032", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895032" }, { "reference_url": "https://usn.ubuntu.com/6890-1/", "reference_id": "USN-6890-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6890-1/" }, { "reference_url": "https://usn.ubuntu.com/6903-1/", "reference_id": "USN-6903-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6903-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-6602" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w794-gqex-83du" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36115?format=api", "vulnerability_id": "VCID-xevc-xbcg-1yct", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7526.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7526.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7526", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.5057", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50617", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50609", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50598", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50629", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50632", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50578", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50626", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50661", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50681", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50675", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50634", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50648", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50671", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303143", "reference_id": "2303143", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303143" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-33/", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-33/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34", "reference_id": "mfsa2024-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-34/", "reference_id": "mfsa2024-34", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-37", "reference_id": "mfsa2024-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-37" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-37/", "reference_id": "mfsa2024-37", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-37/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-38", "reference_id": "mfsa2024-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-38/", "reference_id": "mfsa2024-38", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5322", "reference_id": "RHSA-2024:5322", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5323", "reference_id": "RHSA-2024:5323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5324", "reference_id": "RHSA-2024:5324", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5324" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5325", "reference_id": "RHSA-2024:5325", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5326", "reference_id": "RHSA-2024:5326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5327", "reference_id": "RHSA-2024:5327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5328", "reference_id": "RHSA-2024:5328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5329", "reference_id": "RHSA-2024:5329", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5391", "reference_id": "RHSA-2024:5391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5392", "reference_id": "RHSA-2024:5392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5393", "reference_id": "RHSA-2024:5393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5394", "reference_id": "RHSA-2024:5394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5395", "reference_id": "RHSA-2024:5395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5396", "reference_id": "RHSA-2024:5396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5402", "reference_id": "RHSA-2024:5402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5527", "reference_id": "RHSA-2024:5527", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5527" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5528", "reference_id": "RHSA-2024:5528", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5528" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1910306", "reference_id": "show_bug.cgi?id=1910306", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1910306" }, { "reference_url": "https://usn.ubuntu.com/6966-1/", "reference_id": "USN-6966-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6966-1/" }, { "reference_url": "https://usn.ubuntu.com/6995-1/", "reference_id": "USN-6995-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6995-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-7526" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xevc-xbcg-1yct" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36114?format=api", "vulnerability_id": "VCID-xyqa-esey-73e1", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7525.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7525.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7525", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33163", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33242", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33262", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33549", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33499", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33465", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33421", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33582", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33416", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33449", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33474", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33437", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33461", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33502", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7525" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303142", "reference_id": "2303142", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303142" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-33/", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-33/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34", "reference_id": "mfsa2024-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-34/", "reference_id": "mfsa2024-34", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-37", "reference_id": "mfsa2024-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-37" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-37/", "reference_id": "mfsa2024-37", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-37/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-38", "reference_id": "mfsa2024-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-38/", "reference_id": "mfsa2024-38", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5322", "reference_id": "RHSA-2024:5322", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5323", "reference_id": "RHSA-2024:5323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5324", "reference_id": "RHSA-2024:5324", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5324" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5325", "reference_id": "RHSA-2024:5325", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5326", "reference_id": "RHSA-2024:5326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5327", "reference_id": "RHSA-2024:5327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5328", "reference_id": "RHSA-2024:5328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5329", "reference_id": "RHSA-2024:5329", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5391", "reference_id": "RHSA-2024:5391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5392", "reference_id": "RHSA-2024:5392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5393", "reference_id": "RHSA-2024:5393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5394", "reference_id": "RHSA-2024:5394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5395", "reference_id": "RHSA-2024:5395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5396", "reference_id": "RHSA-2024:5396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5402", "reference_id": "RHSA-2024:5402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5527", "reference_id": "RHSA-2024:5527", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5527" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5528", "reference_id": "RHSA-2024:5528", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5528" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909298", "reference_id": "show_bug.cgi?id=1909298", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909298" }, { "reference_url": "https://usn.ubuntu.com/6966-1/", "reference_id": "USN-6966-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6966-1/" }, { "reference_url": "https://usn.ubuntu.com/6995-1/", "reference_id": "USN-6995-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6995-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-7525" ], "risk_score": 4.1, "exploitability": "0.5", "weighted_severity": "8.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xyqa-esey-73e1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36118?format=api", "vulnerability_id": "VCID-z6kw-szww-7feq", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7529.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7529.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7529", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31421", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31505", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31633", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31947", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31889", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31861", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31808", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31988", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31802", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.3183", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31849", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31818", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31853", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31892", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303146", "reference_id": "2303146", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303146" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-33/", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-33/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34", "reference_id": "mfsa2024-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-34/", "reference_id": "mfsa2024-34", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-37", "reference_id": "mfsa2024-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-37" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-37/", "reference_id": "mfsa2024-37", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-37/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-38", "reference_id": "mfsa2024-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-38/", "reference_id": "mfsa2024-38", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5322", "reference_id": "RHSA-2024:5322", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5323", "reference_id": "RHSA-2024:5323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5324", "reference_id": "RHSA-2024:5324", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5324" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5325", "reference_id": "RHSA-2024:5325", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5326", "reference_id": "RHSA-2024:5326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5327", "reference_id": "RHSA-2024:5327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5328", "reference_id": "RHSA-2024:5328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5329", "reference_id": "RHSA-2024:5329", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5391", "reference_id": "RHSA-2024:5391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5392", "reference_id": "RHSA-2024:5392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5393", "reference_id": "RHSA-2024:5393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5394", "reference_id": "RHSA-2024:5394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5395", "reference_id": "RHSA-2024:5395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5396", "reference_id": "RHSA-2024:5396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5402", "reference_id": "RHSA-2024:5402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5527", "reference_id": "RHSA-2024:5527", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5527" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5528", "reference_id": "RHSA-2024:5528", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5528" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1903187", "reference_id": "show_bug.cgi?id=1903187", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1903187" }, { "reference_url": "https://usn.ubuntu.com/6966-1/", "reference_id": "USN-6966-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6966-1/" }, { "reference_url": "https://usn.ubuntu.com/6995-1/", "reference_id": "USN-6995-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6995-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-7529" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z6kw-szww-7feq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36117?format=api", "vulnerability_id": "VCID-zveb-b3t7-7yfg", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7528.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7528.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7528", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.4681", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46859", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46808", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46862", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46861", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46884", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46857", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46865", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.4692", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46917", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46866", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.4685", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.4686", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46841", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7528" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303145", "reference_id": "2303145", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303145" }, { "reference_url": "https://security.gentoo.org/glsa/202412-04", "reference_id": "GLSA-202412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-04" }, { "reference_url": "https://security.gentoo.org/glsa/202412-06", "reference_id": "GLSA-202412-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-06" }, { "reference_url": "https://security.gentoo.org/glsa/202412-13", "reference_id": "GLSA-202412-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-33/", "reference_id": "mfsa2024-33", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:09:03Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-33/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-35" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", "reference_id": "mfsa2024-35", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:09:03Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-37", "reference_id": "mfsa2024-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-37" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-37/", "reference_id": "mfsa2024-37", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:09:03Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-37/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5322", "reference_id": "RHSA-2024:5322", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5323", "reference_id": "RHSA-2024:5323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5324", "reference_id": "RHSA-2024:5324", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5324" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5325", "reference_id": "RHSA-2024:5325", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5326", "reference_id": "RHSA-2024:5326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5327", "reference_id": "RHSA-2024:5327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5328", "reference_id": "RHSA-2024:5328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5329", "reference_id": "RHSA-2024:5329", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5391", "reference_id": "RHSA-2024:5391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5392", "reference_id": "RHSA-2024:5392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5393", "reference_id": "RHSA-2024:5393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5394", "reference_id": "RHSA-2024:5394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5395", "reference_id": "RHSA-2024:5395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5396", "reference_id": "RHSA-2024:5396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5402", "reference_id": "RHSA-2024:5402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5527", "reference_id": "RHSA-2024:5527", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5527" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5528", "reference_id": "RHSA-2024:5528", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5528" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895951", "reference_id": "show_bug.cgi?id=1895951", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:09:03Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895951" }, { "reference_url": "https://usn.ubuntu.com/6966-1/", "reference_id": "USN-6966-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6966-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75296?format=api", "purl": "pkg:ebuild/dev-lang/spidermonkey@115.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" } ], "aliases": [ "CVE-2024-7528" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zveb-b3t7-7yfg" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/spidermonkey@115.15.0" }