Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/76832?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "type": "ebuild", "namespace": "www-client", "name": "firefox", "version": "103.0", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "104", "latest_non_vulnerable_version": "137.0.1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46620?format=api", "vulnerability_id": "VCID-13kw-adwc-93by", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29918", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60955", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60934", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60956", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60942", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60923", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60965", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60971", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60876", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60904", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60869", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60918", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29918" }, { "reference_url": "https://security.archlinux.org/AVG-2709", "reference_id": "AVG-2709", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2709" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1744043%2C1747178%2C1753535%2C1754017%2C1755847%2C1756172%2C1757477%2C1758223%2C1760160%2C1761481%2C1761771", "reference_id": "buglist.cgi?bug_id=1744043%2C1747178%2C1753535%2C1754017%2C1755847%2C1756172%2C1757477%2C1758223%2C1760160%2C1761481%2C1761771", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:04:30Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1744043%2C1747178%2C1753535%2C1754017%2C1755847%2C1756172%2C1757477%2C1758223%2C1760160%2C1761481%2C1761771" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-16", "reference_id": "mfsa2022-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-16" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-16/", "reference_id": "mfsa2022-16", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:04:30Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-16/" }, { "reference_url": "https://usn.ubuntu.com/5411-1/", "reference_id": "USN-5411-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5411-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-29918" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-13kw-adwc-93by" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31201?format=api", "vulnerability_id": "VCID-17tt-jftn-m3bd", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31737.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31737.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31737", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60286", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60218", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60239", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60258", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60272", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60251", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60237", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60187", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60193", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60279", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092019", "reference_id": "2092019", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092019" }, { "reference_url": "https://security.archlinux.org/AVG-2760", "reference_id": "AVG-2760", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2760" }, { "reference_url": "https://security.archlinux.org/AVG-2761", "reference_id": "AVG-2761", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2761" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-20/", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-16T13:56:21Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-20/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-21", "reference_id": "mfsa2022-21", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-21" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-21/", "reference_id": "mfsa2022-21", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-16T13:56:21Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-21/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-22", "reference_id": "mfsa2022-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-22" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-22/", "reference_id": "mfsa2022-22", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-16T13:56:21Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-22/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4870", "reference_id": "RHSA-2022:4870", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4870" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4871", "reference_id": "RHSA-2022:4871", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4871" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4872", "reference_id": "RHSA-2022:4872", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4872" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4873", "reference_id": "RHSA-2022:4873", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4873" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4875", "reference_id": "RHSA-2022:4875", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4875" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4876", "reference_id": "RHSA-2022:4876", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4876" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4887", "reference_id": "RHSA-2022:4887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4888", "reference_id": "RHSA-2022:4888", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4888" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4889", "reference_id": "RHSA-2022:4889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4890", "reference_id": "RHSA-2022:4890", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4890" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4891", "reference_id": "RHSA-2022:4891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4892", "reference_id": "RHSA-2022:4892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4892" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1743767", "reference_id": "show_bug.cgi?id=1743767", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-16T13:56:21Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1743767" }, { "reference_url": "https://usn.ubuntu.com/5475-1/", "reference_id": "USN-5475-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5475-1/" }, { "reference_url": "https://usn.ubuntu.com/5512-1/", "reference_id": "USN-5512-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5512-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-31737" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-17tt-jftn-m3bd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31183?format=api", "vulnerability_id": "VCID-1erb-xc8r-8kfm", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26384.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26384.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26384", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31038", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31015", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30985", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.3103", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31074", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31164", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30982", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31067", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31117", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30965", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30997", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062221", "reference_id": "2062221", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062221" }, { "reference_url": "https://security.archlinux.org/AVG-2713", "reference_id": "AVG-2713", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2713" }, { "reference_url": "https://security.archlinux.org/AVG-2714", "reference_id": "AVG-2714", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2714" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-10", "reference_id": "mfsa2022-10", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-10" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-10/", "reference_id": "mfsa2022-10", "reference_type": "", "scores": [ { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:16:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-10/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-11", "reference_id": "mfsa2022-11", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-11" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-11/", "reference_id": "mfsa2022-11", "reference_type": "", "scores": [ { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:16:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-11/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-12", "reference_id": "mfsa2022-12", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-12" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-12/", "reference_id": "mfsa2022-12", "reference_type": "", "scores": [ { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:16:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-12/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0815", "reference_id": "RHSA-2022:0815", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0815" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0816", "reference_id": "RHSA-2022:0816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0816" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0817", "reference_id": "RHSA-2022:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0818", "reference_id": "RHSA-2022:0818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0824", "reference_id": "RHSA-2022:0824", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0824" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0843", "reference_id": "RHSA-2022:0843", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0843" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0845", "reference_id": "RHSA-2022:0845", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0845" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0847", "reference_id": "RHSA-2022:0847", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0847" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0850", "reference_id": "RHSA-2022:0850", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0850" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0853", "reference_id": "RHSA-2022:0853", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0853" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1744352", "reference_id": "show_bug.cgi?id=1744352", "reference_type": "", "scores": [ { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:16:17Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1744352" }, { "reference_url": "https://usn.ubuntu.com/5321-1/", "reference_id": "USN-5321-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5321-1/" }, { "reference_url": "https://usn.ubuntu.com/5321-2/", "reference_id": "USN-5321-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5321-2/" }, { "reference_url": "https://usn.ubuntu.com/5345-1/", "reference_id": "USN-5345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5345-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-26384" ], "risk_score": 4.3, "exploitability": "0.5", "weighted_severity": "8.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1erb-xc8r-8kfm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46638?format=api", "vulnerability_id": "VCID-1uqv-yk9v-nkau", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36316", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49567", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.4952", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49584", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49587", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.4954", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49539", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49547", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.495", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49555", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.4955", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49903", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36316" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-28", "reference_id": "mfsa2022-28", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-28" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-28/", "reference_id": "mfsa2022-28", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:05:41Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-28/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1768583", "reference_id": "show_bug.cgi?id=1768583", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:05:41Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1768583" }, { "reference_url": "https://usn.ubuntu.com/5536-1/", "reference_id": "USN-5536-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5536-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-36316" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1uqv-yk9v-nkau" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31153?format=api", "vulnerability_id": "VCID-27hw-egkx-w7d4", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1529.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1529.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1529", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88813", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88878", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88881", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88883", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88822", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.8887", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88875", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88841", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88858", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88863", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88838", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089218", "reference_id": "2089218", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089218" }, { "reference_url": "https://security.archlinux.org/AVG-2728", "reference_id": "AVG-2728", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2728" }, { "reference_url": "https://security.archlinux.org/AVG-2729", "reference_id": "AVG-2729", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2729" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-19", "reference_id": "mfsa2022-19", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-19" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-19/", "reference_id": "mfsa2022-19", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T15:19:19Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-19/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4729", "reference_id": "RHSA-2022:4729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4730", "reference_id": "RHSA-2022:4730", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4730" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4765", "reference_id": "RHSA-2022:4765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4765" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4766", "reference_id": "RHSA-2022:4766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4767", "reference_id": "RHSA-2022:4767", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4767" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4768", "reference_id": "RHSA-2022:4768", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4768" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4769", "reference_id": "RHSA-2022:4769", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4769" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4770", "reference_id": "RHSA-2022:4770", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4770" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4772", "reference_id": "RHSA-2022:4772", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4772" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4773", "reference_id": "RHSA-2022:4773", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4773" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4774", "reference_id": "RHSA-2022:4774", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4774" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4776", "reference_id": "RHSA-2022:4776", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4776" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1770048", "reference_id": "show_bug.cgi?id=1770048", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T15:19:19Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1770048" }, { "reference_url": "https://usn.ubuntu.com/5434-1/", "reference_id": "USN-5434-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5434-1/" }, { "reference_url": "https://usn.ubuntu.com/5435-1/", "reference_id": "USN-5435-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5435-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-1529" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-27hw-egkx-w7d4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31204?format=api", "vulnerability_id": "VCID-2s85-r5tn-wucn", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31741.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31741.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31741", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50074", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50102", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54115", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54096", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54008", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54111", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54072", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54089", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54107", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.5406", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092024", "reference_id": "2092024", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092024" }, { "reference_url": "https://security.archlinux.org/AVG-2760", "reference_id": "AVG-2760", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2760" }, { "reference_url": "https://security.archlinux.org/AVG-2761", "reference_id": "AVG-2761", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2761" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-20/", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:58:38Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-20/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-21", "reference_id": "mfsa2022-21", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-21" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-21/", "reference_id": "mfsa2022-21", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:58:38Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-21/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-22", "reference_id": "mfsa2022-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-22" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-22/", "reference_id": "mfsa2022-22", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:58:38Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-22/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4870", "reference_id": "RHSA-2022:4870", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4870" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4871", "reference_id": "RHSA-2022:4871", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4871" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4872", "reference_id": "RHSA-2022:4872", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4872" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4873", "reference_id": "RHSA-2022:4873", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4873" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4875", "reference_id": "RHSA-2022:4875", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4875" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4876", "reference_id": "RHSA-2022:4876", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4876" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4887", "reference_id": "RHSA-2022:4887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4888", "reference_id": "RHSA-2022:4888", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4888" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4889", "reference_id": "RHSA-2022:4889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4890", "reference_id": "RHSA-2022:4890", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4890" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4891", "reference_id": "RHSA-2022:4891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4892", "reference_id": "RHSA-2022:4892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4892" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1767590", "reference_id": "show_bug.cgi?id=1767590", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:58:38Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1767590" }, { "reference_url": "https://usn.ubuntu.com/5475-1/", "reference_id": "USN-5475-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5475-1/" }, { "reference_url": "https://usn.ubuntu.com/5512-1/", "reference_id": "USN-5512-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5512-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-31741" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2s85-r5tn-wucn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46630?format=api", "vulnerability_id": "VCID-3u86-qe3j-63d3", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34475", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.6728", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67217", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67283", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67303", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67289", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67254", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67302", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67241", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67269", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34475" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-24/", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:29:25Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-24/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1757210", "reference_id": "show_bug.cgi?id=1757210", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:29:25Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1757210" }, { "reference_url": "https://usn.ubuntu.com/5504-1/", "reference_id": "USN-5504-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5504-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-34475" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3u86-qe3j-63d3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46605?format=api", "vulnerability_id": "VCID-5461-sgjx-3yd3", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26385", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57631", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57648", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57652", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57667", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57646", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57626", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57656", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57599", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.5762", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57594", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26385" }, { "reference_url": "https://security.archlinux.org/AVG-2714", "reference_id": "AVG-2714", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2714" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-10", "reference_id": "mfsa2022-10", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-10" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-10/", "reference_id": "mfsa2022-10", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:13:05Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-10/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1747526", "reference_id": "show_bug.cgi?id=1747526", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:13:05Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1747526" }, { "reference_url": "https://usn.ubuntu.com/5321-1/", "reference_id": "USN-5321-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5321-1/" }, { "reference_url": "https://usn.ubuntu.com/5321-2/", "reference_id": "USN-5321-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5321-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-26385" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5461-sgjx-3yd3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31188?format=api", "vulnerability_id": "VCID-59up-n66e-fyhx", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28281.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28281.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28281", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.13838", "scoring_system": "epss", "scoring_elements": "0.94274", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.13838", "scoring_system": "epss", "scoring_elements": "0.94307", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.13838", "scoring_system": "epss", "scoring_elements": "0.94293", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.13838", "scoring_system": "epss", "scoring_elements": "0.94292", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.13838", "scoring_system": "epss", "scoring_elements": "0.94291", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.13838", "scoring_system": "epss", "scoring_elements": "0.94288", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.13838", "scoring_system": "epss", "scoring_elements": "0.94273", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.13838", "scoring_system": "epss", "scoring_elements": "0.94284", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.13838", "scoring_system": "epss", "scoring_elements": "0.94262", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.13838", "scoring_system": "epss", "scoring_elements": "0.94313", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28281" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072560", "reference_id": "2072560", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072560" }, { "reference_url": "https://security.archlinux.org/AVG-2711", "reference_id": "AVG-2711", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2711" }, { "reference_url": "https://security.archlinux.org/AVG-2712", "reference_id": "AVG-2712", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2712" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-13", "reference_id": "mfsa2022-13", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-13" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-13/", "reference_id": "mfsa2022-13", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T20:09:48Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-13/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14", "reference_id": "mfsa2022-14", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-14/", "reference_id": "mfsa2022-14", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T20:09:48Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-14/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15", "reference_id": "mfsa2022-15", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-15/", "reference_id": "mfsa2022-15", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T20:09:48Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-15/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1283", "reference_id": "RHSA-2022:1283", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1283" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1284", "reference_id": "RHSA-2022:1284", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1284" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1285", "reference_id": "RHSA-2022:1285", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1285" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1286", "reference_id": "RHSA-2022:1286", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1286" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1287", "reference_id": "RHSA-2022:1287", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1287" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1301", "reference_id": "RHSA-2022:1301", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1301" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1302", "reference_id": "RHSA-2022:1302", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1302" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1303", "reference_id": "RHSA-2022:1303", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1303" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1305", "reference_id": "RHSA-2022:1305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1326", "reference_id": "RHSA-2022:1326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1326" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1755621", "reference_id": "show_bug.cgi?id=1755621", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T20:09:48Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1755621" }, { "reference_url": "https://usn.ubuntu.com/5370-1/", "reference_id": "USN-5370-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5370-1/" }, { "reference_url": "https://usn.ubuntu.com/5393-1/", "reference_id": "USN-5393-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5393-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-28281" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-59up-n66e-fyhx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31202?format=api", "vulnerability_id": "VCID-5f8u-kf14-tkah", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31738.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31738.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31738", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.3622", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36227", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36243", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36268", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36304", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36299", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36393", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36276", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.3636", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36271", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36287", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092021", "reference_id": "2092021", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092021" }, { "reference_url": "https://security.archlinux.org/AVG-2760", "reference_id": "AVG-2760", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2760" }, { "reference_url": "https://security.archlinux.org/AVG-2761", "reference_id": "AVG-2761", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2761" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-20/", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T13:54:02Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-20/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-21", "reference_id": "mfsa2022-21", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-21" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-21/", "reference_id": "mfsa2022-21", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T13:54:02Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-21/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-22", "reference_id": "mfsa2022-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-22" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-22/", "reference_id": "mfsa2022-22", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T13:54:02Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-22/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4870", "reference_id": "RHSA-2022:4870", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4870" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4871", "reference_id": "RHSA-2022:4871", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4871" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4872", "reference_id": "RHSA-2022:4872", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4872" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4873", "reference_id": "RHSA-2022:4873", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4873" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4875", "reference_id": "RHSA-2022:4875", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4875" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4876", "reference_id": "RHSA-2022:4876", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4876" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4887", "reference_id": "RHSA-2022:4887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4888", "reference_id": "RHSA-2022:4888", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4888" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4889", "reference_id": "RHSA-2022:4889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4890", "reference_id": "RHSA-2022:4890", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4890" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4891", "reference_id": "RHSA-2022:4891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4892", "reference_id": "RHSA-2022:4892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4892" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1756388", "reference_id": "show_bug.cgi?id=1756388", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T13:54:02Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1756388" }, { "reference_url": "https://usn.ubuntu.com/5475-1/", "reference_id": "USN-5475-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5475-1/" }, { "reference_url": "https://usn.ubuntu.com/5512-1/", "reference_id": "USN-5512-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5512-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-31738" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5f8u-kf14-tkah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46601?format=api", "vulnerability_id": "VCID-5up1-n726-hbg2", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0843", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58823", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58706", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.5877", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58822", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58829", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58847", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.5881", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58842", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.5878", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58801", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0843" }, { "reference_url": "https://security.archlinux.org/AVG-2714", "reference_id": "AVG-2714", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2714" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1746523%2C1749062%2C1749164%2C1749214%2C1749610%2C1750032%2C1752100%2C1752405%2C1753612%2C1754508", "reference_id": "buglist.cgi?bug_id=1746523%2C1749062%2C1749164%2C1749214%2C1749610%2C1750032%2C1752100%2C1752405%2C1753612%2C1754508", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T15:31:24Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1746523%2C1749062%2C1749164%2C1749214%2C1749610%2C1750032%2C1752100%2C1752405%2C1753612%2C1754508" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-10", "reference_id": "mfsa2022-10", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-10" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-10/", "reference_id": "mfsa2022-10", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T15:31:24Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-10/" }, { "reference_url": "https://usn.ubuntu.com/5321-1/", "reference_id": "USN-5321-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5321-1/" }, { "reference_url": "https://usn.ubuntu.com/5321-2/", "reference_id": "USN-5321-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5321-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-0843" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5up1-n726-hbg2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46628?format=api", "vulnerability_id": "VCID-6ada-6td5-gyfn", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34473", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67732", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.6766", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.6775", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67735", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67702", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67738", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67751", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67681", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67661", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67712", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67727", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34473" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-24/", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:32:28Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-24/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1770888", "reference_id": "show_bug.cgi?id=1770888", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:32:28Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1770888" }, { "reference_url": "https://usn.ubuntu.com/5504-1/", "reference_id": "USN-5504-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5504-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-34473" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6ada-6td5-gyfn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46632?format=api", "vulnerability_id": "VCID-74b7-rp1u-23hv", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34477", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57735", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57704", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57773", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57752", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57732", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57762", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57759", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57725", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.577", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57755", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57757", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34477" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-24/", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:15:38Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-24/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1731614", "reference_id": "show_bug.cgi?id=1731614", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:15:38Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1731614" }, { "reference_url": "https://usn.ubuntu.com/5504-1/", "reference_id": "USN-5504-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5504-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-34477" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-74b7-rp1u-23hv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31206?format=api", "vulnerability_id": "VCID-7acy-1dnk-pkcq", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31747.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31747.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31747", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00657", "scoring_system": "epss", "scoring_elements": "0.71051", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00657", "scoring_system": "epss", "scoring_elements": "0.7097", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00657", "scoring_system": "epss", "scoring_elements": "0.71018", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00657", "scoring_system": "epss", "scoring_elements": "0.71035", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00657", "scoring_system": "epss", "scoring_elements": "0.7105", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00657", "scoring_system": "epss", "scoring_elements": "0.71027", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00657", "scoring_system": "epss", "scoring_elements": "0.70995", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00657", "scoring_system": "epss", "scoring_elements": "0.71012", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00657", "scoring_system": "epss", "scoring_elements": "0.70978", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00657", "scoring_system": "epss", "scoring_elements": "0.71071", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00657", "scoring_system": "epss", "scoring_elements": "0.71064", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092026", "reference_id": "2092026", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092026" }, { "reference_url": "https://security.archlinux.org/AVG-2760", "reference_id": "AVG-2760", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2760" }, { "reference_url": "https://security.archlinux.org/AVG-2761", "reference_id": "AVG-2761", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2761" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1760765%2C1765610%2C1766283%2C1767365%2C1768559%2C1768734", "reference_id": "buglist.cgi?bug_id=1760765%2C1765610%2C1766283%2C1767365%2C1768559%2C1768734", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T18:22:36Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1760765%2C1765610%2C1766283%2C1767365%2C1768559%2C1768734" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-20/", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T18:22:36Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-20/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-21", "reference_id": "mfsa2022-21", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-21" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-21/", "reference_id": "mfsa2022-21", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T18:22:36Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-21/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-22", "reference_id": "mfsa2022-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-22" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-22/", "reference_id": "mfsa2022-22", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T18:22:36Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-22/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4870", "reference_id": "RHSA-2022:4870", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4870" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4871", "reference_id": "RHSA-2022:4871", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4871" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4872", "reference_id": "RHSA-2022:4872", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4872" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4873", "reference_id": "RHSA-2022:4873", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4873" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4875", "reference_id": "RHSA-2022:4875", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4875" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4876", "reference_id": "RHSA-2022:4876", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4876" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4887", "reference_id": "RHSA-2022:4887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4888", "reference_id": "RHSA-2022:4888", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4888" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4889", "reference_id": "RHSA-2022:4889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4890", "reference_id": "RHSA-2022:4890", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4890" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4891", "reference_id": "RHSA-2022:4891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4892", "reference_id": "RHSA-2022:4892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4892" }, { "reference_url": "https://usn.ubuntu.com/5475-1/", "reference_id": "USN-5475-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5475-1/" }, { "reference_url": "https://usn.ubuntu.com/5512-1/", "reference_id": "USN-5512-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5512-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-31747" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7acy-1dnk-pkcq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31209?format=api", "vulnerability_id": "VCID-7p9y-82kb-r7h3", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34472.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34472.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34472", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63959", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63923", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63961", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63948", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63931", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.6388", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63896", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63949", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63914", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63947", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102166", "reference_id": "2102166", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102166" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-24/", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:41:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-24/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-25", "reference_id": "mfsa2022-25", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-25" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-25/", "reference_id": "mfsa2022-25", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:41:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-25/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-26", "reference_id": "mfsa2022-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-26" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-26/", "reference_id": "mfsa2022-26", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:41:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-26/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5469", "reference_id": "RHSA-2022:5469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5470", "reference_id": "RHSA-2022:5470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5470" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5472", "reference_id": "RHSA-2022:5472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5473", "reference_id": "RHSA-2022:5473", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5473" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5474", "reference_id": "RHSA-2022:5474", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5474" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5475", "reference_id": "RHSA-2022:5475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5477", "reference_id": "RHSA-2022:5477", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5477" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5478", "reference_id": "RHSA-2022:5478", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5478" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5479", "reference_id": "RHSA-2022:5479", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5479" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5480", "reference_id": "RHSA-2022:5480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5481", "reference_id": "RHSA-2022:5481", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5481" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5482", "reference_id": "RHSA-2022:5482", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5482" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1770123", "reference_id": "show_bug.cgi?id=1770123", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:41:27Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1770123" }, { "reference_url": "https://usn.ubuntu.com/5504-1/", "reference_id": "USN-5504-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5504-1/" }, { "reference_url": "https://usn.ubuntu.com/5512-1/", "reference_id": "USN-5512-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5512-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-34472" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7p9y-82kb-r7h3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46621?format=api", "vulnerability_id": "VCID-7tc4-d3hr-bubf", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31743", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.69908", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.69883", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.69905", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.6989", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.69876", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.69917", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.69926", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.69827", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.69842", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.69819", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.69867", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31743" }, { "reference_url": "https://security.archlinux.org/AVG-2760", "reference_id": "AVG-2760", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2760" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-20/", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:29:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-20/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1747388", "reference_id": "show_bug.cgi?id=1747388", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:29:49Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1747388" }, { "reference_url": "https://usn.ubuntu.com/5475-1/", "reference_id": "USN-5475-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5475-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-31743" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7tc4-d3hr-bubf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46623?format=api", "vulnerability_id": "VCID-8hrt-1yt3-1bh3", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31745", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45185", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45195", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45196", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45217", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45184", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45186", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45239", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45232", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56579", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31745" }, { "reference_url": "https://security.archlinux.org/AVG-2760", "reference_id": "AVG-2760", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2760" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-20/", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:26:18Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-20/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1760944", "reference_id": "show_bug.cgi?id=1760944", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:26:18Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1760944" }, { "reference_url": "https://usn.ubuntu.com/5475-1/", "reference_id": "USN-5475-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5475-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-31745" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8hrt-1yt3-1bh3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46603?format=api", "vulnerability_id": "VCID-8uk6-x62z-uybr", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2505.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2505.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2505", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43728", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43795", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43803", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43757", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43742", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43758", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.4379", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.4377", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43767", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43782", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43715", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2505" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111910", "reference_id": "2111910", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111910" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1769739%2C1772824", "reference_id": "buglist.cgi?bug_id=1769739%2C1772824", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:58:50Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1769739%2C1772824" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-28", "reference_id": "mfsa2022-28", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-28" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-28/", "reference_id": "mfsa2022-28", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:58:50Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-28/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-30", "reference_id": "mfsa2022-30", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-30/", "reference_id": "mfsa2022-30", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:58:50Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-32", "reference_id": "mfsa2022-32", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-32" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-32/", "reference_id": "mfsa2022-32", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:58:50Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-32/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5765", "reference_id": "RHSA-2022:5765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5765" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5766", "reference_id": "RHSA-2022:5766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5767", "reference_id": "RHSA-2022:5767", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5767" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5769", "reference_id": "RHSA-2022:5769", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5769" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5770", "reference_id": "RHSA-2022:5770", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5770" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5771", "reference_id": "RHSA-2022:5771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5771" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5772", "reference_id": "RHSA-2022:5772", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5772" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5773", "reference_id": "RHSA-2022:5773", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5773" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5774", "reference_id": "RHSA-2022:5774", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5774" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5776", "reference_id": "RHSA-2022:5776", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5776" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5777", "reference_id": "RHSA-2022:5777", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5777" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5778", "reference_id": "RHSA-2022:5778", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5778" }, { "reference_url": "https://usn.ubuntu.com/5536-1/", "reference_id": "USN-5536-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5536-1/" }, { "reference_url": "https://usn.ubuntu.com/5663-1/", "reference_id": "USN-5663-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5663-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-2505" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8uk6-x62z-uybr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31205?format=api", "vulnerability_id": "VCID-9tdt-84zg-3fd7", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31742.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31742.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31742", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57996", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57958", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57989", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.5801", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58031", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58015", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57982", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58013", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57963", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58018", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.5802", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092025", "reference_id": "2092025", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092025" }, { "reference_url": "https://security.archlinux.org/AVG-2760", "reference_id": "AVG-2760", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2760" }, { "reference_url": "https://security.archlinux.org/AVG-2761", "reference_id": "AVG-2761", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2761" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-20/", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:36:32Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-20/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-21", "reference_id": "mfsa2022-21", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-21" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-21/", "reference_id": "mfsa2022-21", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:36:32Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-21/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-22", "reference_id": "mfsa2022-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-22" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-22/", "reference_id": "mfsa2022-22", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:36:32Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-22/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4870", "reference_id": "RHSA-2022:4870", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4870" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4871", "reference_id": "RHSA-2022:4871", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4871" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4872", "reference_id": "RHSA-2022:4872", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4872" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4873", "reference_id": "RHSA-2022:4873", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4873" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4875", "reference_id": "RHSA-2022:4875", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4875" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4876", "reference_id": "RHSA-2022:4876", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4876" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4887", "reference_id": "RHSA-2022:4887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4888", "reference_id": "RHSA-2022:4888", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4888" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4889", "reference_id": "RHSA-2022:4889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4890", "reference_id": "RHSA-2022:4890", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4890" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4891", "reference_id": "RHSA-2022:4891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4892", "reference_id": "RHSA-2022:4892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4892" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1730434", "reference_id": "show_bug.cgi?id=1730434", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:36:32Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1730434" }, { "reference_url": "https://usn.ubuntu.com/5475-1/", "reference_id": "USN-5475-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5475-1/" }, { "reference_url": "https://usn.ubuntu.com/5512-1/", "reference_id": "USN-5512-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5512-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-31742" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9tdt-84zg-3fd7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31155?format=api", "vulnerability_id": "VCID-9tkb-9fch-67bc", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1802.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1802.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1802", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.67932", "scoring_system": "epss", "scoring_elements": "0.98576", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.67932", "scoring_system": "epss", "scoring_elements": "0.98597", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.67932", "scoring_system": "epss", "scoring_elements": "0.98595", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.67932", "scoring_system": "epss", "scoring_elements": "0.98591", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.67932", "scoring_system": "epss", "scoring_elements": "0.98578", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.67932", "scoring_system": "epss", "scoring_elements": "0.98589", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.67932", "scoring_system": "epss", "scoring_elements": "0.98587", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.67932", "scoring_system": "epss", "scoring_elements": "0.98586", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.67932", "scoring_system": "epss", "scoring_elements": "0.98581", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.67932", "scoring_system": "epss", "scoring_elements": "0.98583", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1802" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089217", "reference_id": "2089217", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089217" }, { "reference_url": "https://security.archlinux.org/AVG-2728", "reference_id": "AVG-2728", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2728" }, { "reference_url": "https://security.archlinux.org/AVG-2729", "reference_id": "AVG-2729", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2729" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-19", "reference_id": "mfsa2022-19", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-19" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-19/", "reference_id": "mfsa2022-19", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:16:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-19/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4729", "reference_id": "RHSA-2022:4729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4730", "reference_id": "RHSA-2022:4730", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4730" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4765", "reference_id": "RHSA-2022:4765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4765" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4766", "reference_id": "RHSA-2022:4766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4767", "reference_id": "RHSA-2022:4767", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4767" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4768", "reference_id": "RHSA-2022:4768", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4768" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4769", "reference_id": "RHSA-2022:4769", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4769" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4770", "reference_id": "RHSA-2022:4770", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4770" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4772", "reference_id": "RHSA-2022:4772", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4772" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4773", "reference_id": "RHSA-2022:4773", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4773" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4774", "reference_id": "RHSA-2022:4774", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4774" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4776", "reference_id": "RHSA-2022:4776", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4776" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1770137", "reference_id": "show_bug.cgi?id=1770137", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:16:27Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1770137" }, { "reference_url": "https://usn.ubuntu.com/5434-1/", "reference_id": "USN-5434-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5434-1/" }, { "reference_url": "https://usn.ubuntu.com/5435-1/", "reference_id": "USN-5435-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5435-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-1802" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9tkb-9fch-67bc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31214?format=api", "vulnerability_id": "VCID-9tnj-j5xv-43cm", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36318.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36318.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36318", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41617", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41709", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41637", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41686", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41695", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41682", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41692", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.4167", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41718", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41685", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36319" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111908", "reference_id": "2111908", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111908" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-28", "reference_id": "mfsa2022-28", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-28" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-28/", "reference_id": "mfsa2022-28", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:05:19Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-28/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-29", "reference_id": "mfsa2022-29", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-29/", "reference_id": "mfsa2022-29", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:05:19Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-30", "reference_id": "mfsa2022-30", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-30/", "reference_id": "mfsa2022-30", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:05:19Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-31", "reference_id": "mfsa2022-31", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-31/", "reference_id": "mfsa2022-31", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:05:19Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-32", "reference_id": "mfsa2022-32", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-32" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-32/", "reference_id": "mfsa2022-32", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:05:19Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-32/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5765", "reference_id": "RHSA-2022:5765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5765" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5766", "reference_id": "RHSA-2022:5766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5767", "reference_id": "RHSA-2022:5767", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5767" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5769", "reference_id": "RHSA-2022:5769", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5769" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5770", "reference_id": "RHSA-2022:5770", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5770" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5771", "reference_id": "RHSA-2022:5771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5771" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5772", "reference_id": "RHSA-2022:5772", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5772" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5773", "reference_id": "RHSA-2022:5773", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5773" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5774", "reference_id": "RHSA-2022:5774", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5774" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5776", "reference_id": "RHSA-2022:5776", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5776" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5777", "reference_id": "RHSA-2022:5777", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5777" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5778", "reference_id": "RHSA-2022:5778", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5778" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1771774", "reference_id": "show_bug.cgi?id=1771774", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:05:19Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1771774" }, { "reference_url": "https://usn.ubuntu.com/5536-1/", "reference_id": "USN-5536-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5536-1/" }, { "reference_url": "https://usn.ubuntu.com/5663-1/", "reference_id": "USN-5663-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5663-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-36318" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9tnj-j5xv-43cm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31199?format=api", "vulnerability_id": "VCID-a2nq-ss2f-bqac", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29917.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29917.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29917", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00346", "scoring_system": "epss", "scoring_elements": "0.57274", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00346", "scoring_system": "epss", "scoring_elements": "0.57267", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00346", "scoring_system": "epss", "scoring_elements": "0.5727", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00346", "scoring_system": "epss", "scoring_elements": "0.57291", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00346", "scoring_system": "epss", "scoring_elements": "0.57311", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00346", "scoring_system": "epss", "scoring_elements": "0.57298", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00346", "scoring_system": "epss", "scoring_elements": "0.57296", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00346", "scoring_system": "epss", "scoring_elements": "0.57244", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00346", "scoring_system": "epss", "scoring_elements": "0.57243", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00346", "scoring_system": "epss", "scoring_elements": "0.57294", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29917" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081473", "reference_id": "2081473", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081473" }, { "reference_url": "https://security.archlinux.org/AVG-2709", "reference_id": "AVG-2709", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2709" }, { "reference_url": "https://security.archlinux.org/AVG-2710", "reference_id": "AVG-2710", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2710" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1684739%2C1706441%2C1753298%2C1762614%2C1762620%2C1764778", "reference_id": "buglist.cgi?bug_id=1684739%2C1706441%2C1753298%2C1762614%2C1762620%2C1764778", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:06:01Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1684739%2C1706441%2C1753298%2C1762614%2C1762620%2C1764778" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-16", "reference_id": "mfsa2022-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-16" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-16/", "reference_id": "mfsa2022-16", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:06:01Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-16/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-17", "reference_id": "mfsa2022-17", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-17" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-17/", "reference_id": "mfsa2022-17", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:06:01Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-17/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-18", "reference_id": "mfsa2022-18", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-18" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-18/", "reference_id": "mfsa2022-18", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:06:01Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-18/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1701", "reference_id": "RHSA-2022:1701", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1702", "reference_id": "RHSA-2022:1702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1703", "reference_id": "RHSA-2022:1703", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1703" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1704", "reference_id": "RHSA-2022:1704", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1704" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1705", "reference_id": "RHSA-2022:1705", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1705" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1724", "reference_id": "RHSA-2022:1724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1725", "reference_id": "RHSA-2022:1725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1726", "reference_id": "RHSA-2022:1726", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1726" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1727", "reference_id": "RHSA-2022:1727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1730", "reference_id": "RHSA-2022:1730", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1730" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4589", "reference_id": "RHSA-2022:4589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4589" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4590", "reference_id": "RHSA-2022:4590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4590" }, { "reference_url": "https://usn.ubuntu.com/5411-1/", "reference_id": "USN-5411-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5411-1/" }, { "reference_url": "https://usn.ubuntu.com/5435-1/", "reference_id": "USN-5435-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5435-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-29917" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a2nq-ss2f-bqac" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46622?format=api", "vulnerability_id": "VCID-ahzj-vepp-r3f4", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31744.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31744.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31744", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20143", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20144", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.2014", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20308", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20148", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20208", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20253", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20229", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20171", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20367", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.2009", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102165", "reference_id": "2102165", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102165" }, { "reference_url": "https://security.archlinux.org/AVG-2760", "reference_id": "AVG-2760", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2760" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-20/", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:28:40Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-20/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-25", "reference_id": "mfsa2022-25", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-25" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-25/", "reference_id": "mfsa2022-25", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:28:40Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-25/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-26", "reference_id": "mfsa2022-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-26" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-26/", "reference_id": "mfsa2022-26", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:28:40Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-26/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5469", "reference_id": "RHSA-2022:5469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5470", "reference_id": "RHSA-2022:5470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5470" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5472", "reference_id": "RHSA-2022:5472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5473", "reference_id": "RHSA-2022:5473", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5473" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5474", "reference_id": "RHSA-2022:5474", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5474" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5475", "reference_id": "RHSA-2022:5475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5477", "reference_id": "RHSA-2022:5477", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5477" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5478", "reference_id": "RHSA-2022:5478", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5478" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5479", "reference_id": "RHSA-2022:5479", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5479" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5480", "reference_id": "RHSA-2022:5480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5481", "reference_id": "RHSA-2022:5481", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5481" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5482", "reference_id": "RHSA-2022:5482", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5482" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1757604", "reference_id": "show_bug.cgi?id=1757604", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:28:40Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1757604" }, { "reference_url": "https://usn.ubuntu.com/5475-1/", "reference_id": "USN-5475-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5475-1/" }, { "reference_url": "https://usn.ubuntu.com/5512-1/", "reference_id": "USN-5512-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5512-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-31744" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ahzj-vepp-r3f4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46604?format=api", "vulnerability_id": "VCID-b3rt-2zdj-4bct", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26382", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52743", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52701", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52695", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52746", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52729", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52713", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52752", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52759", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52659", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52685", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.5265", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26382" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.archlinux.org/AVG-2714", "reference_id": "AVG-2714", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2714" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-10", "reference_id": "mfsa2022-10", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-10" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-10/", "reference_id": "mfsa2022-10", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:26:09Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-10/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1741888", "reference_id": "show_bug.cgi?id=1741888", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:26:09Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1741888" }, { "reference_url": "https://usn.ubuntu.com/5321-1/", "reference_id": "USN-5321-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5321-1/" }, { "reference_url": "https://usn.ubuntu.com/5321-2/", "reference_id": "USN-5321-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5321-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-26382" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b3rt-2zdj-4bct" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46608?format=api", "vulnerability_id": "VCID-c9mk-pbph-jfbn", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28287", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57631", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57594", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57648", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57652", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57667", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57646", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57626", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57656", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57599", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.5762", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28287" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.archlinux.org/AVG-2711", "reference_id": "AVG-2711", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2711" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-13", "reference_id": "mfsa2022-13", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-13" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-13/", "reference_id": "mfsa2022-13", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:01:25Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-13/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1741515", "reference_id": "show_bug.cgi?id=1741515", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:01:25Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1741515" }, { "reference_url": "https://usn.ubuntu.com/5370-1/", "reference_id": "USN-5370-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5370-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-28287" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c9mk-pbph-jfbn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31181?format=api", "vulnerability_id": "VCID-cqpd-wav4-pubn", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26381.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26381.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26381", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40798", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40814", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.4077", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40789", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40824", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40823", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40748", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40805", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40796", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40706", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40785", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062223", "reference_id": "2062223", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062223" }, { "reference_url": "https://security.archlinux.org/AVG-2713", "reference_id": "AVG-2713", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2713" }, { "reference_url": "https://security.archlinux.org/AVG-2714", "reference_id": "AVG-2714", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2714" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-10", "reference_id": "mfsa2022-10", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-10" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-10/", "reference_id": "mfsa2022-10", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:27:14Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-10/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-11", "reference_id": "mfsa2022-11", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-11" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-11/", "reference_id": "mfsa2022-11", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:27:14Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-11/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-12", "reference_id": "mfsa2022-12", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-12" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-12/", "reference_id": "mfsa2022-12", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:27:14Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-12/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0815", "reference_id": "RHSA-2022:0815", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0815" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0816", "reference_id": "RHSA-2022:0816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0816" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0817", "reference_id": "RHSA-2022:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0818", "reference_id": "RHSA-2022:0818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0824", "reference_id": "RHSA-2022:0824", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0824" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0843", "reference_id": "RHSA-2022:0843", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0843" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0845", "reference_id": "RHSA-2022:0845", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0845" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0847", "reference_id": "RHSA-2022:0847", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0847" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0850", "reference_id": "RHSA-2022:0850", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0850" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0853", "reference_id": "RHSA-2022:0853", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0853" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1736243", "reference_id": "show_bug.cgi?id=1736243", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:27:14Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1736243" }, { "reference_url": "https://usn.ubuntu.com/5321-1/", "reference_id": "USN-5321-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5321-1/" }, { "reference_url": "https://usn.ubuntu.com/5321-2/", "reference_id": "USN-5321-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5321-2/" }, { "reference_url": "https://usn.ubuntu.com/5345-1/", "reference_id": "USN-5345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5345-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-26381" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cqpd-wav4-pubn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46633?format=api", "vulnerability_id": "VCID-dcw1-cagp-mkd5", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34480.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34480.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34480", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63078", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63163", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63141", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63159", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63144", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63121", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63156", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63107", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63072", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63124", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34480" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359028", "reference_id": "2359028", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359028" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-24/", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:54:01Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-24/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1454072", "reference_id": "show_bug.cgi?id=1454072", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:54:01Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1454072" }, { "reference_url": "https://usn.ubuntu.com/5504-1/", "reference_id": "USN-5504-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5504-1/" }, { "reference_url": "https://usn.ubuntu.com/5506-1/", "reference_id": "USN-5506-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5506-1/" }, { "reference_url": "https://usn.ubuntu.com/5872-1/", "reference_id": "USN-5872-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5872-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-34480" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dcw1-cagp-mkd5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31198?format=api", "vulnerability_id": "VCID-dg61-9h8j-tkfj", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29916.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29916.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29916", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47885", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47823", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47882", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47873", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47895", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47871", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47874", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47876", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47852", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47931", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47937", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081470", "reference_id": "2081470", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081470" }, { "reference_url": "https://security.archlinux.org/AVG-2709", "reference_id": "AVG-2709", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2709" }, { "reference_url": "https://security.archlinux.org/AVG-2710", "reference_id": "AVG-2710", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2710" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-16", "reference_id": "mfsa2022-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-16" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-16/", "reference_id": "mfsa2022-16", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:07:07Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-16/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-17", "reference_id": "mfsa2022-17", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-17" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-17/", "reference_id": "mfsa2022-17", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:07:07Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-17/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-18", "reference_id": "mfsa2022-18", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-18" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-18/", "reference_id": "mfsa2022-18", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:07:07Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-18/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1701", "reference_id": "RHSA-2022:1701", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1702", "reference_id": "RHSA-2022:1702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1703", "reference_id": "RHSA-2022:1703", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1703" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1704", "reference_id": "RHSA-2022:1704", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1704" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1705", "reference_id": "RHSA-2022:1705", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1705" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1724", "reference_id": "RHSA-2022:1724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1725", "reference_id": "RHSA-2022:1725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1726", "reference_id": "RHSA-2022:1726", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1726" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1727", "reference_id": "RHSA-2022:1727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1730", "reference_id": "RHSA-2022:1730", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1730" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4589", "reference_id": "RHSA-2022:4589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4589" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4590", "reference_id": "RHSA-2022:4590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4590" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1760674", "reference_id": "show_bug.cgi?id=1760674", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:07:07Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1760674" }, { "reference_url": "https://usn.ubuntu.com/5411-1/", "reference_id": "USN-5411-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5411-1/" }, { "reference_url": "https://usn.ubuntu.com/5435-1/", "reference_id": "USN-5435-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5435-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-29916" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dg61-9h8j-tkfj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46626?format=api", "vulnerability_id": "VCID-dq19-byye-fuag", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34469", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19251", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19477", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19371", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19375", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19326", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19268", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19231", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19524", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.1924", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19319", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34469" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-24/", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:18:21Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-24/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1721220", "reference_id": "show_bug.cgi?id=1721220", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:18:21Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1721220" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-34469" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dq19-byye-fuag" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31203?format=api", "vulnerability_id": "VCID-dqhd-ay8b-wfam", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31740.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31740.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31740", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47623", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47613", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47636", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47612", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47616", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47561", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47592", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47671", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47679", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47621", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092023", "reference_id": "2092023", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092023" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-20/", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:51:22Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-20/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-21", "reference_id": "mfsa2022-21", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-21" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-21/", "reference_id": "mfsa2022-21", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:51:22Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-21/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-22", "reference_id": "mfsa2022-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-22" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-22/", "reference_id": "mfsa2022-22", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:51:22Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-22/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4870", "reference_id": "RHSA-2022:4870", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4870" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4871", "reference_id": "RHSA-2022:4871", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4871" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4872", "reference_id": "RHSA-2022:4872", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4872" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4873", "reference_id": "RHSA-2022:4873", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4873" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4875", "reference_id": "RHSA-2022:4875", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4875" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4876", "reference_id": "RHSA-2022:4876", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4876" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4887", "reference_id": "RHSA-2022:4887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4888", "reference_id": "RHSA-2022:4888", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4888" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4889", "reference_id": "RHSA-2022:4889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4890", "reference_id": "RHSA-2022:4890", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4890" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4891", "reference_id": "RHSA-2022:4891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4892", "reference_id": "RHSA-2022:4892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4892" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1766806", "reference_id": "show_bug.cgi?id=1766806", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:51:22Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1766806" }, { "reference_url": "https://usn.ubuntu.com/5475-1/", "reference_id": "USN-5475-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5475-1/" }, { "reference_url": "https://usn.ubuntu.com/5494-1/", "reference_id": "USN-5494-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5494-1/" }, { "reference_url": "https://usn.ubuntu.com/5512-1/", "reference_id": "USN-5512-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5512-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-31740" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dqhd-ay8b-wfam" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46602?format=api", "vulnerability_id": "VCID-fj49-kvwy-bycm", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1919", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00482", "scoring_system": "epss", "scoring_elements": "0.65214", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00482", "scoring_system": "epss", "scoring_elements": "0.65087", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00482", "scoring_system": "epss", "scoring_elements": "0.65169", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00482", "scoring_system": "epss", "scoring_elements": "0.65204", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00482", "scoring_system": "epss", "scoring_elements": "0.65137", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00482", "scoring_system": "epss", "scoring_elements": "0.65163", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00482", "scoring_system": "epss", "scoring_elements": "0.65129", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00482", "scoring_system": "epss", "scoring_elements": "0.65178", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00482", "scoring_system": "epss", "scoring_elements": "0.65191", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00482", "scoring_system": "epss", "scoring_elements": "0.65209", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00482", "scoring_system": "epss", "scoring_elements": "0.65197", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1919" }, { "reference_url": "https://security.archlinux.org/AVG-2760", "reference_id": "AVG-2760", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2760" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20" }, { "reference_url": "https://usn.ubuntu.com/5475-1/", "reference_id": "USN-5475-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5475-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-1919" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fj49-kvwy-bycm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46627?format=api", "vulnerability_id": "VCID-g83q-g16g-wqc2", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34471", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38746", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.3884", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38866", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38829", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38802", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38848", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38826", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38861", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.3879", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38842", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38854", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34471" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-24/", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:48:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-24/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1766047", "reference_id": "show_bug.cgi?id=1766047", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:48:29Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1766047" }, { "reference_url": "https://usn.ubuntu.com/5504-1/", "reference_id": "USN-5504-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5504-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-34471" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g83q-g16g-wqc2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31197?format=api", "vulnerability_id": "VCID-gfve-nzmn-dbbd", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29914.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29914.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29914", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47284", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47227", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47283", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47276", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47302", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47278", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.4728", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47282", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47261", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47334", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47339", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081468", "reference_id": "2081468", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081468" }, { "reference_url": "https://security.archlinux.org/AVG-2709", "reference_id": "AVG-2709", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2709" }, { "reference_url": "https://security.archlinux.org/AVG-2710", "reference_id": "AVG-2710", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2710" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-16", "reference_id": "mfsa2022-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-16" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-16/", "reference_id": "mfsa2022-16", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:58:16Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-16/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-17", "reference_id": "mfsa2022-17", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-17" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-17/", "reference_id": "mfsa2022-17", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:58:16Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-17/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-18", "reference_id": "mfsa2022-18", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-18" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-18/", "reference_id": "mfsa2022-18", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:58:16Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-18/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1701", "reference_id": "RHSA-2022:1701", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1702", "reference_id": "RHSA-2022:1702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1703", "reference_id": "RHSA-2022:1703", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1703" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1704", "reference_id": "RHSA-2022:1704", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1704" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1705", "reference_id": "RHSA-2022:1705", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1705" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1724", "reference_id": "RHSA-2022:1724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1725", "reference_id": "RHSA-2022:1725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1726", "reference_id": "RHSA-2022:1726", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1726" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1727", "reference_id": "RHSA-2022:1727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1730", "reference_id": "RHSA-2022:1730", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1730" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4589", "reference_id": "RHSA-2022:4589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4589" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4590", "reference_id": "RHSA-2022:4590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4590" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1746448", "reference_id": "show_bug.cgi?id=1746448", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:58:16Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1746448" }, { "reference_url": "https://usn.ubuntu.com/5411-1/", "reference_id": "USN-5411-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5411-1/" }, { "reference_url": "https://usn.ubuntu.com/5435-1/", "reference_id": "USN-5435-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5435-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-29914" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gfve-nzmn-dbbd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31212?format=api", "vulnerability_id": "VCID-gxfx-4gxp-3kdw", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34481.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34481.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34481", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43603", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43668", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43629", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43678", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43617", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43634", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43666", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43646", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43642", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43654", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43591", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102164", "reference_id": "2102164", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102164" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-24/", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:53:12Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-24/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-25", "reference_id": "mfsa2022-25", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-25" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-25/", "reference_id": "mfsa2022-25", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:53:12Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-25/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-26", "reference_id": "mfsa2022-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-26" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-26/", "reference_id": "mfsa2022-26", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:53:12Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-26/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5469", "reference_id": "RHSA-2022:5469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5470", "reference_id": "RHSA-2022:5470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5470" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5472", "reference_id": "RHSA-2022:5472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5473", "reference_id": "RHSA-2022:5473", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5473" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5474", "reference_id": "RHSA-2022:5474", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5474" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5475", "reference_id": "RHSA-2022:5475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5477", "reference_id": "RHSA-2022:5477", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5477" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5478", "reference_id": "RHSA-2022:5478", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5478" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5479", "reference_id": "RHSA-2022:5479", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5479" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5480", "reference_id": "RHSA-2022:5480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5481", "reference_id": "RHSA-2022:5481", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5481" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5482", "reference_id": "RHSA-2022:5482", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5482" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1497246", "reference_id": "show_bug.cgi?id=1497246", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:53:12Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1497246" }, { "reference_url": "https://usn.ubuntu.com/5504-1/", "reference_id": "USN-5504-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5504-1/" }, { "reference_url": "https://usn.ubuntu.com/5512-1/", "reference_id": "USN-5512-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5512-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-34481" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gxfx-4gxp-3kdw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31191?format=api", "vulnerability_id": "VCID-hsr3-c152-nucq", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28286.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28286.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28286", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41272", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41351", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41307", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41321", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41352", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41331", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41346", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41323", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41318", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41249", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28286" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072564", "reference_id": "2072564", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072564" }, { "reference_url": "https://security.archlinux.org/AVG-2711", "reference_id": "AVG-2711", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2711" }, { "reference_url": "https://security.archlinux.org/AVG-2712", "reference_id": "AVG-2712", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2712" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-13", "reference_id": "mfsa2022-13", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-13" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-13/", "reference_id": "mfsa2022-13", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:02:32Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-13/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14", "reference_id": "mfsa2022-14", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-14/", "reference_id": "mfsa2022-14", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:02:32Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-14/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15", "reference_id": "mfsa2022-15", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-15/", "reference_id": "mfsa2022-15", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:02:32Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-15/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1283", "reference_id": "RHSA-2022:1283", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1283" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1284", "reference_id": "RHSA-2022:1284", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1284" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1285", "reference_id": "RHSA-2022:1285", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1285" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1286", "reference_id": "RHSA-2022:1286", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1286" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1287", "reference_id": "RHSA-2022:1287", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1287" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1301", "reference_id": "RHSA-2022:1301", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1301" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1302", "reference_id": "RHSA-2022:1302", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1302" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1303", "reference_id": "RHSA-2022:1303", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1303" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1305", "reference_id": "RHSA-2022:1305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1326", "reference_id": "RHSA-2022:1326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1326" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1735265", "reference_id": "show_bug.cgi?id=1735265", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:02:32Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1735265" }, { "reference_url": "https://usn.ubuntu.com/5370-1/", "reference_id": "USN-5370-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5370-1/" }, { "reference_url": "https://usn.ubuntu.com/5393-1/", "reference_id": "USN-5393-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5393-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-28286" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hsr3-c152-nucq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31211?format=api", "vulnerability_id": "VCID-husj-kjf4-ufeq", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34479.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34479.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34479", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40066", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40146", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40157", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40176", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40126", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40145", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40172", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40159", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40182", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40106", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102161", "reference_id": "2102161", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102161" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-24/", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:09:26Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-24/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-25", "reference_id": "mfsa2022-25", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-25" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-25/", "reference_id": "mfsa2022-25", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:09:26Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-25/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-26", "reference_id": "mfsa2022-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-26" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-26/", "reference_id": "mfsa2022-26", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:09:26Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-26/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5469", "reference_id": "RHSA-2022:5469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5470", "reference_id": "RHSA-2022:5470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5470" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5472", "reference_id": "RHSA-2022:5472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5473", "reference_id": "RHSA-2022:5473", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5473" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5474", "reference_id": "RHSA-2022:5474", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5474" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5475", "reference_id": "RHSA-2022:5475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5477", "reference_id": "RHSA-2022:5477", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5477" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5478", "reference_id": "RHSA-2022:5478", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5478" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5479", "reference_id": "RHSA-2022:5479", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5479" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5480", "reference_id": "RHSA-2022:5480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5481", "reference_id": "RHSA-2022:5481", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5481" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5482", "reference_id": "RHSA-2022:5482", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5482" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1745595", "reference_id": "show_bug.cgi?id=1745595", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:09:26Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1745595" }, { "reference_url": "https://usn.ubuntu.com/5504-1/", "reference_id": "USN-5504-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5504-1/" }, { "reference_url": "https://usn.ubuntu.com/5512-1/", "reference_id": "USN-5512-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5512-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-34479" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-husj-kjf4-ufeq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31195?format=api", "vulnerability_id": "VCID-j1zj-1dr1-8yhc", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29912.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29912.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29912", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67384", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67322", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.6736", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67395", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67407", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67386", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67344", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67373", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67321", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67406", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67394", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081472", "reference_id": "2081472", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081472" }, { "reference_url": "https://security.archlinux.org/AVG-2709", "reference_id": "AVG-2709", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2709" }, { "reference_url": "https://security.archlinux.org/AVG-2710", "reference_id": "AVG-2710", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2710" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-16", "reference_id": "mfsa2022-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-16" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-16/", "reference_id": "mfsa2022-16", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:01:23Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-16/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-17", "reference_id": "mfsa2022-17", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-17" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-17/", "reference_id": "mfsa2022-17", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:01:23Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-17/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-18", "reference_id": "mfsa2022-18", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-18" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-18/", "reference_id": "mfsa2022-18", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:01:23Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-18/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1701", "reference_id": "RHSA-2022:1701", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1702", "reference_id": "RHSA-2022:1702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1703", "reference_id": "RHSA-2022:1703", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1703" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1704", "reference_id": "RHSA-2022:1704", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1704" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1705", "reference_id": "RHSA-2022:1705", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1705" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1724", "reference_id": "RHSA-2022:1724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1725", "reference_id": "RHSA-2022:1725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1726", "reference_id": "RHSA-2022:1726", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1726" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1727", "reference_id": "RHSA-2022:1727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1730", "reference_id": "RHSA-2022:1730", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1730" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4589", "reference_id": "RHSA-2022:4589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4589" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4590", "reference_id": "RHSA-2022:4590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4590" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1692655", "reference_id": "show_bug.cgi?id=1692655", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:01:23Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1692655" }, { "reference_url": "https://usn.ubuntu.com/5411-1/", "reference_id": "USN-5411-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5411-1/" }, { "reference_url": "https://usn.ubuntu.com/5435-1/", "reference_id": "USN-5435-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5435-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-29912" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j1zj-1dr1-8yhc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31213?format=api", "vulnerability_id": "VCID-jg37-y3r7-8fcq", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34484.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34484.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34484", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51337", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51357", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51263", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51349", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51308", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51322", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51343", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51299", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51303", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51288", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51248", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102169", "reference_id": "2102169", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102169" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1763634%2C1772651", "reference_id": "buglist.cgi?bug_id=1763634%2C1772651", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T17:42:21Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1763634%2C1772651" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-24/", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T17:42:21Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-24/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-25", "reference_id": "mfsa2022-25", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-25" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-25/", "reference_id": "mfsa2022-25", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T17:42:21Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-25/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-26", "reference_id": "mfsa2022-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-26" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-26/", "reference_id": "mfsa2022-26", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T17:42:21Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-26/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5469", "reference_id": "RHSA-2022:5469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5470", "reference_id": "RHSA-2022:5470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5470" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5472", "reference_id": "RHSA-2022:5472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5473", "reference_id": "RHSA-2022:5473", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5473" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5474", "reference_id": "RHSA-2022:5474", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5474" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5475", "reference_id": "RHSA-2022:5475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5477", "reference_id": "RHSA-2022:5477", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5477" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5478", "reference_id": "RHSA-2022:5478", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5478" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5479", "reference_id": "RHSA-2022:5479", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5479" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5480", "reference_id": "RHSA-2022:5480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5481", "reference_id": "RHSA-2022:5481", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5481" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5482", "reference_id": "RHSA-2022:5482", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5482" }, { "reference_url": "https://usn.ubuntu.com/5504-1/", "reference_id": "USN-5504-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5504-1/" }, { "reference_url": "https://usn.ubuntu.com/5512-1/", "reference_id": "USN-5512-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5512-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-34484" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jg37-y3r7-8fcq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31192?format=api", "vulnerability_id": "VCID-mw9j-h66p-k7as", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28289.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28289.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28289", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58928", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.5895", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58915", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58934", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58952", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58909", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58876", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58933", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58887", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58932", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58953", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28289" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072566", "reference_id": "2072566", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072566" }, { "reference_url": "https://security.archlinux.org/AVG-2711", "reference_id": "AVG-2711", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2711" }, { "reference_url": "https://security.archlinux.org/AVG-2712", "reference_id": "AVG-2712", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2712" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1663508%2C1744525%2C1753508%2C1757476%2C1757805%2C1758549%2C1758776", "reference_id": "buglist.cgi?bug_id=1663508%2C1744525%2C1753508%2C1757476%2C1757805%2C1758549%2C1758776", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:59:30Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1663508%2C1744525%2C1753508%2C1757476%2C1757805%2C1758549%2C1758776" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-13", "reference_id": "mfsa2022-13", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-13" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-13/", "reference_id": "mfsa2022-13", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:59:30Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-13/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14", "reference_id": "mfsa2022-14", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-14/", "reference_id": "mfsa2022-14", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:59:30Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-14/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15", "reference_id": "mfsa2022-15", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-15/", "reference_id": "mfsa2022-15", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:59:30Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-15/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1283", "reference_id": "RHSA-2022:1283", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1283" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1284", "reference_id": "RHSA-2022:1284", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1284" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1285", "reference_id": "RHSA-2022:1285", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1285" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1286", "reference_id": "RHSA-2022:1286", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1286" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1287", "reference_id": "RHSA-2022:1287", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1287" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1301", "reference_id": "RHSA-2022:1301", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1301" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1302", "reference_id": "RHSA-2022:1302", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1302" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1303", "reference_id": "RHSA-2022:1303", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1303" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1305", "reference_id": "RHSA-2022:1305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1326", "reference_id": "RHSA-2022:1326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1326" }, { "reference_url": "https://usn.ubuntu.com/5370-1/", "reference_id": "USN-5370-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5370-1/" }, { "reference_url": "https://usn.ubuntu.com/5393-1/", "reference_id": "USN-5393-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5393-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-28289" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mw9j-h66p-k7as" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31186?format=api", "vulnerability_id": "VCID-mwd4-pgxg-zkha", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26485.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26485.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26485", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06126", "scoring_system": "epss", "scoring_elements": "0.90758", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06126", "scoring_system": "epss", "scoring_elements": "0.90769", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0719", "scoring_system": "epss", "scoring_elements": "0.91609", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0719", "scoring_system": "epss", "scoring_elements": "0.91569", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0719", "scoring_system": "epss", "scoring_elements": "0.91582", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0719", "scoring_system": "epss", "scoring_elements": "0.91588", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0719", "scoring_system": "epss", "scoring_elements": "0.91592", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0719", "scoring_system": "epss", "scoring_elements": "0.91594", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0719", "scoring_system": "epss", "scoring_elements": "0.91614", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26486" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061736", "reference_id": "2061736", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061736" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-09", "reference_id": "mfsa2022-09", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-09" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-09/", "reference_id": "mfsa2022-09", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:32:55Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-09/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0815", "reference_id": "RHSA-2022:0815", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0815" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0816", "reference_id": "RHSA-2022:0816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0816" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0817", "reference_id": "RHSA-2022:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0818", "reference_id": "RHSA-2022:0818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0824", "reference_id": "RHSA-2022:0824", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0824" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0843", "reference_id": "RHSA-2022:0843", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0843" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0845", "reference_id": "RHSA-2022:0845", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0845" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0847", "reference_id": "RHSA-2022:0847", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0847" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0850", "reference_id": "RHSA-2022:0850", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0850" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0853", "reference_id": "RHSA-2022:0853", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0853" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1758062", "reference_id": "show_bug.cgi?id=1758062", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:32:55Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1758062" }, { "reference_url": "https://usn.ubuntu.com/5314-1/", "reference_id": "USN-5314-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5314-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-26485" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mwd4-pgxg-zkha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46629?format=api", "vulnerability_id": "VCID-ndtj-s8ud-57gu", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34474", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46873", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46849", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46892", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46865", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46872", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46928", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46924", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46867", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46816", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.4687", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46869", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34474" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-24/", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:31:13Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-24/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1677138", "reference_id": "show_bug.cgi?id=1677138", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:31:13Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1677138" }, { "reference_url": "https://usn.ubuntu.com/5504-1/", "reference_id": "USN-5504-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5504-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-34474" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ndtj-s8ud-57gu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46624?format=api", "vulnerability_id": "VCID-nxhd-we9n-67fe", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31748", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68364", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68352", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68378", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68365", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68332", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68372", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68385", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68288", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68308", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68284", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68336", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31748" }, { "reference_url": "https://security.archlinux.org/AVG-2760", "reference_id": "AVG-2760", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2760" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1713773%2C1762201%2C1762469%2C1762770%2C1764878%2C1765226%2C1765782%2C1765973%2C1767177%2C1767181%2C1768232%2C1768251%2C1769869", "reference_id": "buglist.cgi?bug_id=1713773%2C1762201%2C1762469%2C1762770%2C1764878%2C1765226%2C1765782%2C1765973%2C1767177%2C1767181%2C1768232%2C1768251%2C1769869", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T18:21:24Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1713773%2C1762201%2C1762469%2C1762770%2C1764878%2C1765226%2C1765782%2C1765973%2C1767177%2C1767181%2C1768232%2C1768251%2C1769869" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-20/", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T18:21:24Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-20/" }, { "reference_url": "https://usn.ubuntu.com/5475-1/", "reference_id": "USN-5475-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5475-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-31748" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nxhd-we9n-67fe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46613?format=api", "vulnerability_id": "VCID-phf8-uzdb-vber", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29910", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47997", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47965", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.48005", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47982", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47993", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.48046", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.48041", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47986", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47934", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47987", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47981", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29910" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-16", "reference_id": "mfsa2022-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-16" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-16/", "reference_id": "mfsa2022-16", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T13:45:34Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-16/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1757138", "reference_id": "show_bug.cgi?id=1757138", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T13:45:34Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1757138" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-29910" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-phf8-uzdb-vber" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31187?format=api", "vulnerability_id": "VCID-pzf5-v82a-hkb9", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26486.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26486.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26486", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05458", "scoring_system": "epss", "scoring_elements": "0.90205", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05458", "scoring_system": "epss", "scoring_elements": "0.90182", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05458", "scoring_system": "epss", "scoring_elements": "0.90187", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05458", "scoring_system": "epss", "scoring_elements": "0.90196", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05458", "scoring_system": "epss", "scoring_elements": "0.90195", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05458", "scoring_system": "epss", "scoring_elements": "0.9019", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05458", "scoring_system": "epss", "scoring_elements": "0.90208", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05458", "scoring_system": "epss", "scoring_elements": "0.9015", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05458", "scoring_system": "epss", "scoring_elements": "0.90161", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05458", "scoring_system": "epss", "scoring_elements": "0.90166", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26486" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061735", "reference_id": "2061735", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061735" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-09", "reference_id": "mfsa2022-09", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-09" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-09/", "reference_id": "mfsa2022-09", "reference_type": "", "scores": [ { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:24:00Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-09/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0815", "reference_id": "RHSA-2022:0815", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0815" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0816", "reference_id": "RHSA-2022:0816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0816" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0817", "reference_id": "RHSA-2022:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0818", "reference_id": "RHSA-2022:0818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0824", "reference_id": "RHSA-2022:0824", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0824" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0843", "reference_id": "RHSA-2022:0843", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0843" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0845", "reference_id": "RHSA-2022:0845", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0845" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0847", "reference_id": "RHSA-2022:0847", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0847" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0850", "reference_id": "RHSA-2022:0850", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0850" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0853", "reference_id": "RHSA-2022:0853", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0853" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1758070", "reference_id": "show_bug.cgi?id=1758070", "reference_type": "", "scores": [ { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:24:00Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1758070" }, { "reference_url": "https://usn.ubuntu.com/5314-1/", "reference_id": "USN-5314-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5314-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-26486" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pzf5-v82a-hkb9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46606?format=api", "vulnerability_id": "VCID-qa7k-byax-9ugc", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28283", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55386", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55444", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55426", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55383", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55448", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55437", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55408", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28283" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.archlinux.org/AVG-2711", "reference_id": "AVG-2711", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2711" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-13", "reference_id": "mfsa2022-13", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-13" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-13/", "reference_id": "mfsa2022-13", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:14:12Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-13/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1754066", "reference_id": "show_bug.cgi?id=1754066", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:14:12Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1754066" }, { "reference_url": "https://usn.ubuntu.com/5370-1/", "reference_id": "USN-5370-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5370-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-28283" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qa7k-byax-9ugc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46610?format=api", "vulnerability_id": "VCID-qfk6-r2rj-9yd2", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28288", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60955", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60918", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60934", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60956", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60942", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60923", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60965", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60971", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60876", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60904", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60869", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28288" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.archlinux.org/AVG-2711", "reference_id": "AVG-2711", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2711" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1746415%2C1746495%2C1746500%2C1747282%2C1748759%2C1749056%2C1749786%2C1751679%2C1752120%2C1756010%2C1756017%2C1757213%2C1757258%2C1757427", "reference_id": "buglist.cgi?bug_id=1746415%2C1746495%2C1746500%2C1747282%2C1748759%2C1749056%2C1749786%2C1751679%2C1752120%2C1756010%2C1756017%2C1757213%2C1757258%2C1757427", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:00:32Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1746415%2C1746495%2C1746500%2C1747282%2C1748759%2C1749056%2C1749786%2C1751679%2C1752120%2C1756010%2C1756017%2C1757213%2C1757258%2C1757427" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-13", "reference_id": "mfsa2022-13", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-13" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-13/", "reference_id": "mfsa2022-13", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:00:32Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-13/" }, { "reference_url": "https://usn.ubuntu.com/5370-1/", "reference_id": "USN-5370-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5370-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-28288" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qfk6-r2rj-9yd2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31185?format=api", "vulnerability_id": "VCID-qh4a-bn9p-a7hh", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26387.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26387.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26387", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29741", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29685", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29735", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29781", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29864", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29679", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29777", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29817", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29637", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29681", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29703", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26387" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062222", "reference_id": "2062222", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062222" }, { "reference_url": "https://security.archlinux.org/AVG-2713", "reference_id": "AVG-2713", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2713" }, { "reference_url": "https://security.archlinux.org/AVG-2714", "reference_id": "AVG-2714", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2714" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-10", "reference_id": "mfsa2022-10", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-10" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-10/", "reference_id": "mfsa2022-10", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T20:10:36Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-10/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-11", "reference_id": "mfsa2022-11", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-11" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-11/", "reference_id": "mfsa2022-11", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T20:10:36Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-11/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-12", "reference_id": "mfsa2022-12", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-12" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-12/", "reference_id": "mfsa2022-12", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T20:10:36Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-12/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0815", "reference_id": "RHSA-2022:0815", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0815" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0816", "reference_id": "RHSA-2022:0816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0816" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0817", "reference_id": "RHSA-2022:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0818", "reference_id": "RHSA-2022:0818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0824", "reference_id": "RHSA-2022:0824", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0824" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0843", "reference_id": "RHSA-2022:0843", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0843" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0845", "reference_id": "RHSA-2022:0845", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0845" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0847", "reference_id": "RHSA-2022:0847", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0847" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0850", "reference_id": "RHSA-2022:0850", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0850" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0853", "reference_id": "RHSA-2022:0853", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0853" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1752979", "reference_id": "show_bug.cgi?id=1752979", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T20:10:36Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1752979" }, { "reference_url": "https://usn.ubuntu.com/5321-1/", "reference_id": "USN-5321-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5321-1/" }, { "reference_url": "https://usn.ubuntu.com/5321-2/", "reference_id": "USN-5321-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5321-2/" }, { "reference_url": "https://usn.ubuntu.com/5345-1/", "reference_id": "USN-5345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5345-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-26387" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qh4a-bn9p-a7hh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31194?format=api", "vulnerability_id": "VCID-r587-gyj4-5kee", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29911.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29911.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29911", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54781", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.5475", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54741", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54762", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54778", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54767", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54771", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54719", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54727", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54779", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081471", "reference_id": "2081471", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081471" }, { "reference_url": "https://security.archlinux.org/AVG-2709", "reference_id": "AVG-2709", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2709" }, { "reference_url": "https://security.archlinux.org/AVG-2710", "reference_id": "AVG-2710", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2710" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-16", "reference_id": "mfsa2022-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-16" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-16/", "reference_id": "mfsa2022-16", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T13:58:31Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-16/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-17", "reference_id": "mfsa2022-17", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-17" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-17/", "reference_id": "mfsa2022-17", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T13:58:31Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-17/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-18", "reference_id": "mfsa2022-18", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-18" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-18/", "reference_id": "mfsa2022-18", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T13:58:31Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-18/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1701", "reference_id": "RHSA-2022:1701", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1702", "reference_id": "RHSA-2022:1702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1703", "reference_id": "RHSA-2022:1703", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1703" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1704", "reference_id": "RHSA-2022:1704", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1704" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1705", "reference_id": "RHSA-2022:1705", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1705" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1724", "reference_id": "RHSA-2022:1724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1725", "reference_id": "RHSA-2022:1725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1726", "reference_id": "RHSA-2022:1726", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1726" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1727", "reference_id": "RHSA-2022:1727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1730", "reference_id": "RHSA-2022:1730", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1730" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4589", "reference_id": "RHSA-2022:4589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4589" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4590", "reference_id": "RHSA-2022:4590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4590" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1761981", "reference_id": "show_bug.cgi?id=1761981", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T13:58:31Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1761981" }, { "reference_url": "https://usn.ubuntu.com/5411-1/", "reference_id": "USN-5411-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5411-1/" }, { "reference_url": "https://usn.ubuntu.com/5435-1/", "reference_id": "USN-5435-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5435-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-29911" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r587-gyj4-5kee" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31189?format=api", "vulnerability_id": "VCID-r631-9h74-sygv", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28282.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28282.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28282", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05281", "scoring_system": "epss", "scoring_elements": "0.89985", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05281", "scoring_system": "epss", "scoring_elements": "0.90023", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05281", "scoring_system": "epss", "scoring_elements": "0.90007", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05281", "scoring_system": "epss", "scoring_elements": "0.90013", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05281", "scoring_system": "epss", "scoring_elements": "0.90015", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05281", "scoring_system": "epss", "scoring_elements": "0.90006", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05281", "scoring_system": "epss", "scoring_elements": "0.89979", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05281", "scoring_system": "epss", "scoring_elements": "0.90001", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05281", "scoring_system": "epss", "scoring_elements": "0.89967", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05281", "scoring_system": "epss", "scoring_elements": "0.9002", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072562", "reference_id": "2072562", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072562" }, { "reference_url": "https://security.archlinux.org/AVG-2711", "reference_id": "AVG-2711", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2711" }, { "reference_url": "https://security.archlinux.org/AVG-2712", "reference_id": "AVG-2712", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2712" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-13", "reference_id": "mfsa2022-13", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-13" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-13/", "reference_id": "mfsa2022-13", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:08:53Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-13/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14", "reference_id": "mfsa2022-14", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-14/", "reference_id": "mfsa2022-14", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:08:53Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-14/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15", "reference_id": "mfsa2022-15", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-15/", "reference_id": "mfsa2022-15", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:08:53Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-15/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1283", "reference_id": "RHSA-2022:1283", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1283" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1284", "reference_id": "RHSA-2022:1284", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1284" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1285", "reference_id": "RHSA-2022:1285", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1285" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1286", "reference_id": "RHSA-2022:1286", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1286" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1287", "reference_id": "RHSA-2022:1287", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1287" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1301", "reference_id": "RHSA-2022:1301", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1301" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1302", "reference_id": "RHSA-2022:1302", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1302" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1303", "reference_id": "RHSA-2022:1303", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1303" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1305", "reference_id": "RHSA-2022:1305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1326", "reference_id": "RHSA-2022:1326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1326" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1751609", "reference_id": "show_bug.cgi?id=1751609", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:08:53Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1751609" }, { "reference_url": "https://usn.ubuntu.com/5370-1/", "reference_id": "USN-5370-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5370-1/" }, { "reference_url": "https://usn.ubuntu.com/5393-1/", "reference_id": "USN-5393-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5393-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-28282" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r631-9h74-sygv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46639?format=api", "vulnerability_id": "VCID-sd2d-m1n5-8kdg", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36320", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66482", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.6641", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66489", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66477", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66446", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66481", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66498", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66437", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66407", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66456", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66469", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36320" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1759794%2C1760998", "reference_id": "buglist.cgi?bug_id=1759794%2C1760998", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T16:55:17Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1759794%2C1760998" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-28", "reference_id": "mfsa2022-28", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-28" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-28/", "reference_id": "mfsa2022-28", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T16:55:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-28/" }, { "reference_url": "https://usn.ubuntu.com/5536-1/", "reference_id": "USN-5536-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5536-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-36320" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sd2d-m1n5-8kdg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31207?format=api", "vulnerability_id": "VCID-sm2q-bg6f-4qag", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34468.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34468.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34468", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66943", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.6696", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66877", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66946", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66913", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66944", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66958", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66937", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66924", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66903", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66876", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34468" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102163", "reference_id": "2102163", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102163" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-24/", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:20:14Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-24/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-25", "reference_id": "mfsa2022-25", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-25" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-25/", "reference_id": "mfsa2022-25", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:20:14Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-25/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-26", "reference_id": "mfsa2022-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-26" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-26/", "reference_id": "mfsa2022-26", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:20:14Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-26/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5469", "reference_id": "RHSA-2022:5469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5470", "reference_id": "RHSA-2022:5470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5470" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5472", "reference_id": "RHSA-2022:5472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5473", "reference_id": "RHSA-2022:5473", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5473" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5474", "reference_id": "RHSA-2022:5474", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5474" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5475", "reference_id": "RHSA-2022:5475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5477", "reference_id": "RHSA-2022:5477", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5477" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5478", "reference_id": "RHSA-2022:5478", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5478" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5479", "reference_id": "RHSA-2022:5479", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5479" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5480", "reference_id": "RHSA-2022:5480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5481", "reference_id": "RHSA-2022:5481", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5481" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5482", "reference_id": "RHSA-2022:5482", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5482" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1768537", "reference_id": "show_bug.cgi?id=1768537", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:20:14Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1768537" }, { "reference_url": "https://usn.ubuntu.com/5504-1/", "reference_id": "USN-5504-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5504-1/" }, { "reference_url": "https://usn.ubuntu.com/5512-1/", "reference_id": "USN-5512-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5512-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-34468" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sm2q-bg6f-4qag" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31150?format=api", "vulnerability_id": "VCID-t98b-d1uu-pkan", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1196.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1196.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1196", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41665", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41645", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41739", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41718", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41729", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41732", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41765", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41742", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41734", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41757", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41684", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072561", "reference_id": "2072561", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072561" }, { "reference_url": "https://security.archlinux.org/AVG-2712", "reference_id": "AVG-2712", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2712" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14", "reference_id": "mfsa2022-14", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-14/", "reference_id": "mfsa2022-14", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:27:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-14/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15", "reference_id": "mfsa2022-15", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-15/", "reference_id": "mfsa2022-15", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:27:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-15/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1283", "reference_id": "RHSA-2022:1283", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1283" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1284", "reference_id": "RHSA-2022:1284", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1284" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1285", "reference_id": "RHSA-2022:1285", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1285" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1286", "reference_id": "RHSA-2022:1286", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1286" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1287", "reference_id": "RHSA-2022:1287", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1287" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1301", "reference_id": "RHSA-2022:1301", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1301" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1302", "reference_id": "RHSA-2022:1302", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1302" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1303", "reference_id": "RHSA-2022:1303", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1303" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1305", "reference_id": "RHSA-2022:1305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1326", "reference_id": "RHSA-2022:1326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1326" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1750679", "reference_id": "show_bug.cgi?id=1750679", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:27:49Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1750679" }, { "reference_url": "https://usn.ubuntu.com/5393-1/", "reference_id": "USN-5393-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5393-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-1196" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t98b-d1uu-pkan" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46637?format=api", "vulnerability_id": "VCID-utn2-nt3q-fugv", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36315", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36737", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36888", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36827", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36792", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36767", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36813", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36796", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36919", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36752", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36803", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36818", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36315" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-28", "reference_id": "mfsa2022-28", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-28" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-28/", "reference_id": "mfsa2022-28", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:19:25Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-28/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1762520", "reference_id": "show_bug.cgi?id=1762520", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:19:25Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1762520" }, { "reference_url": "https://usn.ubuntu.com/5536-1/", "reference_id": "USN-5536-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5536-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-36315" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-utn2-nt3q-fugv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31208?format=api", "vulnerability_id": "VCID-v865-5aar-sueu", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34470.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34470.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34470", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70708", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.7073", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70628", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70723", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70677", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.7069", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70705", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70682", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70667", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70644", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70621", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102162", "reference_id": "2102162", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102162" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-24/", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:51:07Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-24/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-25", "reference_id": "mfsa2022-25", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-25" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-25/", "reference_id": "mfsa2022-25", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:51:07Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-25/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-26", "reference_id": "mfsa2022-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-26" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-26/", "reference_id": "mfsa2022-26", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:51:07Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-26/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5469", "reference_id": "RHSA-2022:5469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5470", "reference_id": "RHSA-2022:5470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5470" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5472", "reference_id": "RHSA-2022:5472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5473", "reference_id": "RHSA-2022:5473", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5473" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5474", "reference_id": "RHSA-2022:5474", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5474" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5475", "reference_id": "RHSA-2022:5475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5477", "reference_id": "RHSA-2022:5477", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5477" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5478", "reference_id": "RHSA-2022:5478", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5478" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5479", "reference_id": "RHSA-2022:5479", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5479" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5480", "reference_id": "RHSA-2022:5480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5481", "reference_id": "RHSA-2022:5481", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5481" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5482", "reference_id": "RHSA-2022:5482", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5482" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1765951", "reference_id": "show_bug.cgi?id=1765951", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:51:07Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1765951" }, { "reference_url": "https://usn.ubuntu.com/5504-1/", "reference_id": "USN-5504-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5504-1/" }, { "reference_url": "https://usn.ubuntu.com/5512-1/", "reference_id": "USN-5512-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5512-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-34470" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v865-5aar-sueu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31193?format=api", "vulnerability_id": "VCID-vd6g-ywvd-gfhf", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29909.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29909.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29909", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41747", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.4183", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41845", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41796", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41842", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41819", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41809", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41759", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41801", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29909" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081469", "reference_id": "2081469", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081469" }, { "reference_url": "https://security.archlinux.org/AVG-2709", "reference_id": "AVG-2709", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2709" }, { "reference_url": "https://security.archlinux.org/AVG-2710", "reference_id": "AVG-2710", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2710" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-16", "reference_id": "mfsa2022-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-16" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-16/", "reference_id": "mfsa2022-16", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T13:47:34Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-16/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-17", "reference_id": "mfsa2022-17", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-17" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-17/", "reference_id": "mfsa2022-17", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T13:47:34Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-17/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-18", "reference_id": "mfsa2022-18", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-18" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-18/", "reference_id": "mfsa2022-18", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T13:47:34Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-18/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1701", "reference_id": "RHSA-2022:1701", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1702", "reference_id": "RHSA-2022:1702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1703", "reference_id": "RHSA-2022:1703", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1703" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1704", "reference_id": "RHSA-2022:1704", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1704" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1705", "reference_id": "RHSA-2022:1705", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1705" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1724", "reference_id": "RHSA-2022:1724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1725", "reference_id": "RHSA-2022:1725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1726", "reference_id": "RHSA-2022:1726", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1726" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1727", "reference_id": "RHSA-2022:1727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1730", "reference_id": "RHSA-2022:1730", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1730" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4589", "reference_id": "RHSA-2022:4589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4589" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4590", "reference_id": "RHSA-2022:4590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4590" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1755081", "reference_id": "show_bug.cgi?id=1755081", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T13:47:34Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1755081" }, { "reference_url": "https://usn.ubuntu.com/5411-1/", "reference_id": "USN-5411-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5411-1/" }, { "reference_url": "https://usn.ubuntu.com/5435-1/", "reference_id": "USN-5435-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5435-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-29909" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vd6g-ywvd-gfhf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31200?format=api", "vulnerability_id": "VCID-vg6v-8pv2-mfhf", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31736.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31736.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31736", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.4396", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.43953", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.43973", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.43989", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.44021", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.44006", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.44023", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.44004", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.44", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.44026", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.44035", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092018", "reference_id": "2092018", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092018" }, { "reference_url": "https://security.archlinux.org/AVG-2760", "reference_id": "AVG-2760", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2760" }, { "reference_url": "https://security.archlinux.org/AVG-2761", "reference_id": "AVG-2761", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2761" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-20/", "reference_id": "mfsa2022-20", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:56:54Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-20/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-21", "reference_id": "mfsa2022-21", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-21" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-21/", "reference_id": "mfsa2022-21", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:56:54Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-21/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-22", "reference_id": "mfsa2022-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-22" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-22/", "reference_id": "mfsa2022-22", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:56:54Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-22/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4870", "reference_id": "RHSA-2022:4870", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4870" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4871", "reference_id": "RHSA-2022:4871", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4871" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4872", "reference_id": "RHSA-2022:4872", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4872" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4873", "reference_id": "RHSA-2022:4873", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4873" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4875", "reference_id": "RHSA-2022:4875", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4875" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4876", "reference_id": "RHSA-2022:4876", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4876" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4887", "reference_id": "RHSA-2022:4887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4888", "reference_id": "RHSA-2022:4888", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4888" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4889", "reference_id": "RHSA-2022:4889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4890", "reference_id": "RHSA-2022:4890", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4890" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4891", "reference_id": "RHSA-2022:4891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4892", "reference_id": "RHSA-2022:4892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4892" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1735923", "reference_id": "show_bug.cgi?id=1735923", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:56:54Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1735923" }, { "reference_url": "https://usn.ubuntu.com/5475-1/", "reference_id": "USN-5475-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5475-1/" }, { "reference_url": "https://usn.ubuntu.com/5512-1/", "reference_id": "USN-5512-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5512-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-31736" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vg6v-8pv2-mfhf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31215?format=api", "vulnerability_id": "VCID-vgqa-e7yg-wygj", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36319.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36319.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36319", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35426", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35551", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35434", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.3548", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35504", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35526", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35478", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35488", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35448", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35514", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35471", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36319" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111907", "reference_id": "2111907", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111907" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-28", "reference_id": "mfsa2022-28", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-28" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-28/", "reference_id": "mfsa2022-28", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T16:59:22Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-28/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-29", "reference_id": "mfsa2022-29", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-29/", "reference_id": "mfsa2022-29", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T16:59:22Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-30", "reference_id": "mfsa2022-30", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-30/", "reference_id": "mfsa2022-30", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T16:59:22Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-31", "reference_id": "mfsa2022-31", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-31/", "reference_id": "mfsa2022-31", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T16:59:22Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-32", "reference_id": "mfsa2022-32", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-32" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-32/", "reference_id": "mfsa2022-32", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T16:59:22Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-32/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5765", "reference_id": "RHSA-2022:5765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5765" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5766", "reference_id": "RHSA-2022:5766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5767", "reference_id": "RHSA-2022:5767", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5767" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5769", "reference_id": "RHSA-2022:5769", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5769" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5770", "reference_id": "RHSA-2022:5770", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5770" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5771", "reference_id": "RHSA-2022:5771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5771" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5772", "reference_id": "RHSA-2022:5772", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5772" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5773", "reference_id": "RHSA-2022:5773", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5773" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5774", "reference_id": "RHSA-2022:5774", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5774" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5776", "reference_id": "RHSA-2022:5776", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5776" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5777", "reference_id": "RHSA-2022:5777", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5777" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5778", "reference_id": "RHSA-2022:5778", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5778" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1737722", "reference_id": "show_bug.cgi?id=1737722", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T16:59:22Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1737722" }, { "reference_url": "https://usn.ubuntu.com/5536-1/", "reference_id": "USN-5536-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5536-1/" }, { "reference_url": "https://usn.ubuntu.com/5663-1/", "reference_id": "USN-5663-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5663-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-36319" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vgqa-e7yg-wygj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31190?format=api", "vulnerability_id": "VCID-vpd3-v3fr-hkdm", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28285.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28285.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28285", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48883", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48927", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48879", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48871", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48897", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48875", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48829", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.4888", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48849", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48884", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48923", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28285" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072563", "reference_id": "2072563", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072563" }, { "reference_url": "https://security.archlinux.org/AVG-2711", "reference_id": "AVG-2711", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2711" }, { "reference_url": "https://security.archlinux.org/AVG-2712", "reference_id": "AVG-2712", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2712" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-13", "reference_id": "mfsa2022-13", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-13" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-13/", "reference_id": "mfsa2022-13", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:03:24Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-13/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14", "reference_id": "mfsa2022-14", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-14/", "reference_id": "mfsa2022-14", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:03:24Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-14/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15", "reference_id": "mfsa2022-15", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-15/", "reference_id": "mfsa2022-15", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:03:24Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-15/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1283", "reference_id": "RHSA-2022:1283", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1283" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1284", "reference_id": "RHSA-2022:1284", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1284" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1285", "reference_id": "RHSA-2022:1285", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1285" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1286", "reference_id": "RHSA-2022:1286", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1286" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1287", "reference_id": "RHSA-2022:1287", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1287" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1301", "reference_id": "RHSA-2022:1301", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1301" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1302", "reference_id": "RHSA-2022:1302", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1302" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1303", "reference_id": "RHSA-2022:1303", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1303" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1305", "reference_id": "RHSA-2022:1305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1326", "reference_id": "RHSA-2022:1326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1326" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1756957", "reference_id": "show_bug.cgi?id=1756957", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:03:24Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1756957" }, { "reference_url": "https://usn.ubuntu.com/5370-1/", "reference_id": "USN-5370-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5370-1/" }, { "reference_url": "https://usn.ubuntu.com/5393-1/", "reference_id": "USN-5393-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5393-1/" }, { "reference_url": "https://usn.ubuntu.com/5494-1/", "reference_id": "USN-5494-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5494-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-28285" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vpd3-v3fr-hkdm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31210?format=api", "vulnerability_id": "VCID-vzg5-b77s-g3ft", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34478.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34478.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34478", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.3532", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35373", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35422", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35384", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35345", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35367", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35403", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35401", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35377", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35446", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.3533", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34478" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102167", "reference_id": "2102167", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102167" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-24/", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:14:23Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-24/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-25", "reference_id": "mfsa2022-25", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-25" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-25/", "reference_id": "mfsa2022-25", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:14:23Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-25/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-26", "reference_id": "mfsa2022-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-26" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-26/", "reference_id": "mfsa2022-26", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:14:23Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-26/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1773717", "reference_id": "show_bug.cgi?id=1773717", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:14:23Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1773717" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-34478" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vzg5-b77s-g3ft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46607?format=api", "vulnerability_id": "VCID-w8br-pq5p-bydy", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28284", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58823", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58801", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.5877", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58822", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58829", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58847", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.5881", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58842", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.5878", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28284" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.archlinux.org/AVG-2711", "reference_id": "AVG-2711", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2711" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-13", "reference_id": "mfsa2022-13", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-13" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-13/", "reference_id": "mfsa2022-13", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:05:50Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-13/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1754522", "reference_id": "show_bug.cgi?id=1754522", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:05:50Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1754522" }, { "reference_url": "https://usn.ubuntu.com/5370-1/", "reference_id": "USN-5370-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5370-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-28284" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w8br-pq5p-bydy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46631?format=api", "vulnerability_id": "VCID-w9eu-xqcv-q3hb", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34476", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00588", "scoring_system": "epss", "scoring_elements": "0.69143", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00588", "scoring_system": "epss", "scoring_elements": "0.69068", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00588", "scoring_system": "epss", "scoring_elements": "0.69161", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00588", "scoring_system": "epss", "scoring_elements": "0.69145", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00588", "scoring_system": "epss", "scoring_elements": "0.69116", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00588", "scoring_system": "epss", "scoring_elements": "0.69155", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00588", "scoring_system": "epss", "scoring_elements": "0.69164", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00588", "scoring_system": "epss", "scoring_elements": "0.69089", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00588", "scoring_system": "epss", "scoring_elements": "0.6907", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00588", "scoring_system": "epss", "scoring_elements": "0.6912", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00588", "scoring_system": "epss", "scoring_elements": "0.69139", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34476" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-24/", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T18:26:43Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-24/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1387919", "reference_id": "show_bug.cgi?id=1387919", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T18:26:43Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1387919" }, { "reference_url": "https://usn.ubuntu.com/5504-1/", "reference_id": "USN-5504-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5504-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-34476" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w9eu-xqcv-q3hb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46636?format=api", "vulnerability_id": "VCID-wb1a-t7x7-gkcp", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34485", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68364", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68288", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68378", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68365", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68332", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68372", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68385", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68308", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68284", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68336", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68352", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34485" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1768409%2C1768578", "reference_id": "buglist.cgi?bug_id=1768409%2C1768578", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:34:32Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1768409%2C1768578" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-24/", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:34:32Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-24/" }, { "reference_url": "https://usn.ubuntu.com/5504-1/", "reference_id": "USN-5504-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5504-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-34485" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wb1a-t7x7-gkcp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31184?format=api", "vulnerability_id": "VCID-wqb6-fpwk-ekgy", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26386.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26386.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26386", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28228", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28276", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28434", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28295", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28282", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.2834", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28384", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28269", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28335", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28379", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28477", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26386" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062224", "reference_id": "2062224", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062224" }, { "reference_url": "https://security.archlinux.org/AVG-2713", "reference_id": "AVG-2713", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2713" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-11", "reference_id": "mfsa2022-11", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-11" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-11/", "reference_id": "mfsa2022-11", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:11:42Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-11/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-12", "reference_id": "mfsa2022-12", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-12" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-12/", "reference_id": "mfsa2022-12", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:11:42Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-12/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0815", "reference_id": "RHSA-2022:0815", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0815" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0816", "reference_id": "RHSA-2022:0816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0816" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0817", "reference_id": "RHSA-2022:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0818", "reference_id": "RHSA-2022:0818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0824", "reference_id": "RHSA-2022:0824", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0824" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0843", "reference_id": "RHSA-2022:0843", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0843" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0845", "reference_id": "RHSA-2022:0845", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0845" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0847", "reference_id": "RHSA-2022:0847", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0847" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0850", "reference_id": "RHSA-2022:0850", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0850" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0853", "reference_id": "RHSA-2022:0853", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0853" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1752396", "reference_id": "show_bug.cgi?id=1752396", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:11:42Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1752396" }, { "reference_url": "https://usn.ubuntu.com/5345-1/", "reference_id": "USN-5345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5345-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-26386" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wqb6-fpwk-ekgy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31180?format=api", "vulnerability_id": "VCID-wsdd-t7d2-gbda", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24713.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24713.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24713", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0985", "scoring_system": "epss", "scoring_elements": "0.92963", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0985", "scoring_system": "epss", "scoring_elements": "0.92967", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.10916", "scoring_system": "epss", "scoring_elements": "0.93415", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.10916", "scoring_system": "epss", "scoring_elements": "0.93426", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.10916", "scoring_system": "epss", "scoring_elements": "0.93419", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.11247", "scoring_system": "epss", "scoring_elements": "0.9351", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11247", "scoring_system": "epss", "scoring_elements": "0.93509", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11247", "scoring_system": "epss", "scoring_elements": "0.93505", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11247", "scoring_system": "epss", "scoring_elements": "0.93502", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11247", "scoring_system": "epss", "scoring_elements": "0.93494", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/rust-lang/regex", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/rust-lang/regex" }, { "reference_url": "https://github.com/rust-lang/regex/commit/ae70b41d4f46641dbc45c7a4f87954aea356283e", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/" } ], "url": "https://github.com/rust-lang/regex/commit/ae70b41d4f46641dbc45c7a4f87954aea356283e" }, { "reference_url": "https://github.com/rust-lang/regex/security/advisories/GHSA-m5pq-gvj9-9vr8", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/" } ], "url": "https://github.com/rust-lang/regex/security/advisories/GHSA-m5pq-gvj9-9vr8" }, { "reference_url": "https://groups.google.com/g/rustlang-security-announcements/c/NcNNL1Jq7Yw", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/" } ], "url": "https://groups.google.com/g/rustlang-security-announcements/c/NcNNL1Jq7Yw" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00003.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00003.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00009.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00009.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JANLZ3JXWJR7FSHE57K66UIZUIJZI67T", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JANLZ3JXWJR7FSHE57K66UIZUIJZI67T" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JANLZ3JXWJR7FSHE57K66UIZUIJZI67T/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JANLZ3JXWJR7FSHE57K66UIZUIJZI67T/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3YB7CURSG64CIPCDPNMGPE4UU24AB6H", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3YB7CURSG64CIPCDPNMGPE4UU24AB6H" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3YB7CURSG64CIPCDPNMGPE4UU24AB6H/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3YB7CURSG64CIPCDPNMGPE4UU24AB6H/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ/" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24713", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24713" }, { "reference_url": "https://rustsec.org/advisories/RUSTSEC-2022-0013.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://rustsec.org/advisories/RUSTSEC-2022-0013.html" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5113", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5113" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5118", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5118" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007176", "reference_id": "1007176", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007176" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072565", "reference_id": "2072565", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072565" }, { "reference_url": "https://security.archlinux.org/AVG-2711", "reference_id": "AVG-2711", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2711" }, { "reference_url": "https://security.archlinux.org/AVG-2712", "reference_id": "AVG-2712", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2712" }, { "reference_url": "https://github.com/advisories/GHSA-m5pq-gvj9-9vr8", "reference_id": "GHSA-m5pq-gvj9-9vr8", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-m5pq-gvj9-9vr8" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/" } ], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/" } ], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JANLZ3JXWJR7FSHE57K66UIZUIJZI67T/", "reference_id": "JANLZ3JXWJR7FSHE57K66UIZUIJZI67T", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JANLZ3JXWJR7FSHE57K66UIZUIJZI67T/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-13", "reference_id": "mfsa2022-13", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-13" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14", "reference_id": "mfsa2022-14", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15", "reference_id": "mfsa2022-15", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-15" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3YB7CURSG64CIPCDPNMGPE4UU24AB6H/", "reference_id": "O3YB7CURSG64CIPCDPNMGPE4UU24AB6H", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3YB7CURSG64CIPCDPNMGPE4UU24AB6H/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ/", "reference_id": "PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1283", "reference_id": "RHSA-2022:1283", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1283" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1284", "reference_id": "RHSA-2022:1284", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1284" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1285", "reference_id": "RHSA-2022:1285", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1285" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1286", "reference_id": "RHSA-2022:1286", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1286" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1287", "reference_id": "RHSA-2022:1287", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1287" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1301", "reference_id": "RHSA-2022:1301", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1301" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1302", "reference_id": "RHSA-2022:1302", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1302" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1303", "reference_id": "RHSA-2022:1303", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1303" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1305", "reference_id": "RHSA-2022:1305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1326", "reference_id": "RHSA-2022:1326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1326" }, { "reference_url": "https://usn.ubuntu.com/5370-1/", "reference_id": "USN-5370-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5370-1/" }, { "reference_url": "https://usn.ubuntu.com/5610-1/", "reference_id": "USN-5610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5610-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-24713", "GHSA-m5pq-gvj9-9vr8" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wsdd-t7d2-gbda" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46635?format=api", "vulnerability_id": "VCID-xpjd-99qz-vbbc", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34483", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.669", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66835", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66916", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66901", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66869", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66903", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66917", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66861", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66833", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66882", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66896", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34483" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-24/", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:43:52Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-24/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1335845", "reference_id": "show_bug.cgi?id=1335845", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:43:52Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1335845" }, { "reference_url": "https://usn.ubuntu.com/5504-1/", "reference_id": "USN-5504-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5504-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-34483" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xpjd-99qz-vbbc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31157?format=api", "vulnerability_id": "VCID-ye9r-gnzm-sqe2", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2200.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2200.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2200", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06199", "scoring_system": "epss", "scoring_elements": "0.90886", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06199", "scoring_system": "epss", "scoring_elements": "0.90888", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06199", "scoring_system": "epss", "scoring_elements": "0.90819", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06199", "scoring_system": "epss", "scoring_elements": "0.90864", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06199", "scoring_system": "epss", "scoring_elements": "0.90866", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06199", "scoring_system": "epss", "scoring_elements": "0.90867", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06199", "scoring_system": "epss", "scoring_elements": "0.90858", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06199", "scoring_system": "epss", "scoring_elements": "0.90851", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06199", "scoring_system": "epss", "scoring_elements": "0.90829", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06199", "scoring_system": "epss", "scoring_elements": "0.9084", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2200" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102168", "reference_id": "2102168", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102168" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-24/", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:02:52Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-24/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-25", "reference_id": "mfsa2022-25", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-25" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-25/", "reference_id": "mfsa2022-25", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:02:52Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-25/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-26", "reference_id": "mfsa2022-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-26" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-26/", "reference_id": "mfsa2022-26", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:02:52Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-26/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5469", "reference_id": "RHSA-2022:5469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5470", "reference_id": "RHSA-2022:5470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5470" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5472", "reference_id": "RHSA-2022:5472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5473", "reference_id": "RHSA-2022:5473", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5473" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5474", "reference_id": "RHSA-2022:5474", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5474" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5475", "reference_id": "RHSA-2022:5475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5477", "reference_id": "RHSA-2022:5477", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5477" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5478", "reference_id": "RHSA-2022:5478", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5478" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5479", "reference_id": "RHSA-2022:5479", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5479" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5480", "reference_id": "RHSA-2022:5480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5481", "reference_id": "RHSA-2022:5481", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5481" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5482", "reference_id": "RHSA-2022:5482", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5482" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1771381", "reference_id": "show_bug.cgi?id=1771381", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:02:52Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1771381" }, { "reference_url": "https://usn.ubuntu.com/5504-1/", "reference_id": "USN-5504-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5504-1/" }, { "reference_url": "https://usn.ubuntu.com/5512-1/", "reference_id": "USN-5512-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5512-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-2200" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ye9r-gnzm-sqe2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31182?format=api", "vulnerability_id": "VCID-ztmj-vavn-8kdf", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26383.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26383.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26383", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49553", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49592", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.4959", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49619", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49602", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49601", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49607", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49574", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49636", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49639", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062220", "reference_id": "2062220", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062220" }, { "reference_url": "https://security.archlinux.org/AVG-2713", "reference_id": "AVG-2713", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2713" }, { "reference_url": "https://security.archlinux.org/AVG-2714", "reference_id": "AVG-2714", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2714" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-10", "reference_id": "mfsa2022-10", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-10" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-10/", "reference_id": "mfsa2022-10", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:19:41Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-10/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-11", "reference_id": "mfsa2022-11", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-11" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-11/", "reference_id": "mfsa2022-11", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:19:41Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-11/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-12", "reference_id": "mfsa2022-12", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-12" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-12/", "reference_id": "mfsa2022-12", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:19:41Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-12/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0815", "reference_id": "RHSA-2022:0815", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0815" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0816", "reference_id": "RHSA-2022:0816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0816" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0817", "reference_id": "RHSA-2022:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0818", "reference_id": "RHSA-2022:0818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0824", "reference_id": "RHSA-2022:0824", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0824" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0843", "reference_id": "RHSA-2022:0843", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0843" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0845", "reference_id": "RHSA-2022:0845", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0845" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0847", "reference_id": "RHSA-2022:0847", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0847" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0850", "reference_id": "RHSA-2022:0850", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0850" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0853", "reference_id": "RHSA-2022:0853", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0853" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1742421", "reference_id": "show_bug.cgi?id=1742421", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:19:41Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1742421" }, { "reference_url": "https://usn.ubuntu.com/5321-1/", "reference_id": "USN-5321-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5321-1/" }, { "reference_url": "https://usn.ubuntu.com/5321-2/", "reference_id": "USN-5321-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5321-2/" }, { "reference_url": "https://usn.ubuntu.com/5345-1/", "reference_id": "USN-5345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5345-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-26383" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ztmj-vavn-8kdf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46615?format=api", "vulnerability_id": "VCID-zudh-fjan-hqf1", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29915", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32644", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32697", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32722", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32723", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32686", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32658", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32674", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32791", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32827", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32648", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29915" }, { "reference_url": "https://security.archlinux.org/AVG-2709", "reference_id": "AVG-2709", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2709" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-16", "reference_id": "mfsa2022-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-16" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-16/", "reference_id": "mfsa2022-16", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:09:05Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-16/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1751678", "reference_id": "show_bug.cgi?id=1751678", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:09:05Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1751678" }, { "reference_url": "https://usn.ubuntu.com/5411-1/", "reference_id": "USN-5411-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5411-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-29915" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zudh-fjan-hqf1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46634?format=api", "vulnerability_id": "VCID-zyae-qg8a-6yby", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34482", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59797", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59724", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59804", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59788", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.5977", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59807", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59814", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59749", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59719", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59771", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59785", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34482" }, { "reference_url": "https://security.gentoo.org/glsa/202208-08", "reference_id": "GLSA-202208-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-24/", "reference_id": "mfsa2022-24", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T17:51:21Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2022-24/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=845880", "reference_id": "show_bug.cgi?id=845880", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T17:51:21Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=845880" }, { "reference_url": "https://usn.ubuntu.com/5504-1/", "reference_id": "USN-5504-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5504-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76831?format=api", "purl": "pkg:ebuild/www-client/firefox@91.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/76832?format=api", "purl": "pkg:ebuild/www-client/firefox@103.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" } ], "aliases": [ "CVE-2022-34482" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zyae-qg8a-6yby" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0" }