Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/mail-client/thunderbird-bin@115.7.0
Typeebuild
Namespacemail-client
Namethunderbird-bin
Version115.7.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version115.10.0
Latest_non_vulnerable_version128.9.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-19r2-4svk-uydr
vulnerability_id VCID-19r2-4svk-uydr
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4578.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4578.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4578
reference_id
reference_type
scores
0
value 0.0011
scoring_system epss
scoring_elements 0.29238
published_at 2026-04-21T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35912
published_at 2026-04-04T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35793
published_at 2026-04-08T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35815
published_at 2026-04-09T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35823
published_at 2026-04-11T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35783
published_at 2026-04-12T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.3576
published_at 2026-04-13T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.358
published_at 2026-04-16T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35789
published_at 2026-04-18T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35882
published_at 2026-04-02T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35742
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4578
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236077
reference_id 2236077
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236077
3
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
reference_id mfsa2023-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
5
reference_url https://www.mozilla.org/security/advisories/mfsa2023-34/
reference_id mfsa2023-34
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:09Z/
url https://www.mozilla.org/security/advisories/mfsa2023-34/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
reference_id mfsa2023-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
7
reference_url https://www.mozilla.org/security/advisories/mfsa2023-36/
reference_id mfsa2023-36
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:09Z/
url https://www.mozilla.org/security/advisories/mfsa2023-36/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
reference_id mfsa2023-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
9
reference_url https://www.mozilla.org/security/advisories/mfsa2023-38/
reference_id mfsa2023-38
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:09Z/
url https://www.mozilla.org/security/advisories/mfsa2023-38/
10
reference_url https://access.redhat.com/errata/RHSA-2023:4945
reference_id RHSA-2023:4945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4945
11
reference_url https://access.redhat.com/errata/RHSA-2023:4946
reference_id RHSA-2023:4946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4946
12
reference_url https://access.redhat.com/errata/RHSA-2023:4947
reference_id RHSA-2023:4947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4947
13
reference_url https://access.redhat.com/errata/RHSA-2023:4948
reference_id RHSA-2023:4948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4948
14
reference_url https://access.redhat.com/errata/RHSA-2023:4949
reference_id RHSA-2023:4949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4949
15
reference_url https://access.redhat.com/errata/RHSA-2023:4950
reference_id RHSA-2023:4950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4950
16
reference_url https://access.redhat.com/errata/RHSA-2023:4951
reference_id RHSA-2023:4951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4951
17
reference_url https://access.redhat.com/errata/RHSA-2023:4952
reference_id RHSA-2023:4952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4952
18
reference_url https://access.redhat.com/errata/RHSA-2023:4954
reference_id RHSA-2023:4954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4954
19
reference_url https://access.redhat.com/errata/RHSA-2023:4955
reference_id RHSA-2023:4955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4955
20
reference_url https://access.redhat.com/errata/RHSA-2023:4956
reference_id RHSA-2023:4956
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4956
21
reference_url https://access.redhat.com/errata/RHSA-2023:4957
reference_id RHSA-2023:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4957
22
reference_url https://access.redhat.com/errata/RHSA-2023:4958
reference_id RHSA-2023:4958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4958
23
reference_url https://access.redhat.com/errata/RHSA-2023:4959
reference_id RHSA-2023:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4959
24
reference_url https://access.redhat.com/errata/RHSA-2023:5019
reference_id RHSA-2023:5019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5019
25
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1839007
reference_id show_bug.cgi?id=1839007
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:09Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1839007
26
reference_url https://usn.ubuntu.com/6320-1/
reference_id USN-6320-1
reference_type
scores
url https://usn.ubuntu.com/6320-1/
27
reference_url https://usn.ubuntu.com/6405-1/
reference_id USN-6405-1
reference_type
scores
url https://usn.ubuntu.com/6405-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4578
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-19r2-4svk-uydr
1
url VCID-1dkk-86db-s3ch
vulnerability_id VCID-1dkk-86db-s3ch
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5168.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5168.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5168
reference_id
reference_type
scores
0
value 0.00256
scoring_system epss
scoring_elements 0.4902
published_at 2026-04-21T12:55:00Z
1
value 0.00256
scoring_system epss
scoring_elements 0.49052
published_at 2026-04-18T12:55:00Z
2
value 0.00256
scoring_system epss
scoring_elements 0.48984
published_at 2026-04-02T12:55:00Z
3
value 0.00256
scoring_system epss
scoring_elements 0.49011
published_at 2026-04-13T12:55:00Z
4
value 0.00256
scoring_system epss
scoring_elements 0.49019
published_at 2026-04-08T12:55:00Z
5
value 0.00256
scoring_system epss
scoring_elements 0.48965
published_at 2026-04-07T12:55:00Z
6
value 0.00256
scoring_system epss
scoring_elements 0.49056
published_at 2026-04-16T12:55:00Z
7
value 0.00256
scoring_system epss
scoring_elements 0.49005
published_at 2026-04-12T12:55:00Z
8
value 0.00256
scoring_system epss
scoring_elements 0.49032
published_at 2026-04-11T12:55:00Z
9
value 0.00256
scoring_system epss
scoring_elements 0.49015
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5168
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2240892
reference_id 2240892
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2240892
3
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
reference_id mfsa2023-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
5
reference_url https://www.mozilla.org/security/advisories/mfsa2023-41/
reference_id mfsa2023-41
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:10Z/
url https://www.mozilla.org/security/advisories/mfsa2023-41/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-42
reference_id mfsa2023-42
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-42
7
reference_url https://www.mozilla.org/security/advisories/mfsa2023-42/
reference_id mfsa2023-42
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:10Z/
url https://www.mozilla.org/security/advisories/mfsa2023-42/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-43
reference_id mfsa2023-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-43
9
reference_url https://www.mozilla.org/security/advisories/mfsa2023-43/
reference_id mfsa2023-43
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:10Z/
url https://www.mozilla.org/security/advisories/mfsa2023-43/
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1846683
reference_id show_bug.cgi?id=1846683
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:10Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1846683
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-5168
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1dkk-86db-s3ch
2
url VCID-1h5k-e7nm-uyc9
vulnerability_id VCID-1h5k-e7nm-uyc9
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3417.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3417.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3417
reference_id
reference_type
scores
0
value 0.00161
scoring_system epss
scoring_elements 0.36994
published_at 2026-04-16T12:55:00Z
1
value 0.00161
scoring_system epss
scoring_elements 0.36949
published_at 2026-04-13T12:55:00Z
2
value 0.00161
scoring_system epss
scoring_elements 0.37076
published_at 2026-04-02T12:55:00Z
3
value 0.00161
scoring_system epss
scoring_elements 0.36975
published_at 2026-04-12T12:55:00Z
4
value 0.00161
scoring_system epss
scoring_elements 0.3701
published_at 2026-04-11T12:55:00Z
5
value 0.00161
scoring_system epss
scoring_elements 0.37001
published_at 2026-04-09T12:55:00Z
6
value 0.00161
scoring_system epss
scoring_elements 0.36988
published_at 2026-04-08T12:55:00Z
7
value 0.00161
scoring_system epss
scoring_elements 0.3711
published_at 2026-04-04T12:55:00Z
8
value 0.00161
scoring_system epss
scoring_elements 0.36937
published_at 2026-04-07T12:55:00Z
9
value 0.0021
scoring_system epss
scoring_elements 0.43432
published_at 2026-04-21T12:55:00Z
10
value 0.0021
scoring_system epss
scoring_elements 0.43497
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3417
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3417
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2225325
reference_id 2225325
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2225325
5
reference_url https://www.debian.org/security/2023/dsa-5463
reference_id dsa-5463
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-25T18:54:00Z/
url https://www.debian.org/security/2023/dsa-5463
6
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-27
reference_id mfsa2023-27
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-27
8
reference_url https://www.mozilla.org/security/advisories/mfsa2023-27/
reference_id mfsa2023-27
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-25T18:54:00Z/
url https://www.mozilla.org/security/advisories/mfsa2023-27/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-28
reference_id mfsa2023-28
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-28
10
reference_url https://www.mozilla.org/security/advisories/mfsa2023-28/
reference_id mfsa2023-28
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-25T18:54:00Z/
url https://www.mozilla.org/security/advisories/mfsa2023-28/
11
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00032.html
reference_id msg00032.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-25T18:54:00Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00032.html
12
reference_url https://access.redhat.com/errata/RHSA-2023:4492
reference_id RHSA-2023:4492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4492
13
reference_url https://access.redhat.com/errata/RHSA-2023:4493
reference_id RHSA-2023:4493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4493
14
reference_url https://access.redhat.com/errata/RHSA-2023:4494
reference_id RHSA-2023:4494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4494
15
reference_url https://access.redhat.com/errata/RHSA-2023:4495
reference_id RHSA-2023:4495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4495
16
reference_url https://access.redhat.com/errata/RHSA-2023:4496
reference_id RHSA-2023:4496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4496
17
reference_url https://access.redhat.com/errata/RHSA-2023:4497
reference_id RHSA-2023:4497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4497
18
reference_url https://access.redhat.com/errata/RHSA-2023:4499
reference_id RHSA-2023:4499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4499
19
reference_url https://access.redhat.com/errata/RHSA-2023:4500
reference_id RHSA-2023:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4500
20
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1835582
reference_id show_bug.cgi?id=1835582
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-25T18:54:00Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1835582
21
reference_url https://usn.ubuntu.com/6333-1/
reference_id USN-6333-1
reference_type
scores
url https://usn.ubuntu.com/6333-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-3417
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1h5k-e7nm-uyc9
3
url VCID-32pc-j3he-pffx
vulnerability_id VCID-32pc-j3he-pffx
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4055.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4055.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4055
reference_id
reference_type
scores
0
value 0.00348
scoring_system epss
scoring_elements 0.57397
published_at 2026-04-18T12:55:00Z
1
value 0.00348
scoring_system epss
scoring_elements 0.57375
published_at 2026-04-21T12:55:00Z
2
value 0.00348
scoring_system epss
scoring_elements 0.57395
published_at 2026-04-12T12:55:00Z
3
value 0.00348
scoring_system epss
scoring_elements 0.57416
published_at 2026-04-11T12:55:00Z
4
value 0.00348
scoring_system epss
scoring_elements 0.57348
published_at 2026-04-02T12:55:00Z
5
value 0.00348
scoring_system epss
scoring_elements 0.57347
published_at 2026-04-07T12:55:00Z
6
value 0.00348
scoring_system epss
scoring_elements 0.57371
published_at 2026-04-04T12:55:00Z
7
value 0.00348
scoring_system epss
scoring_elements 0.57401
published_at 2026-04-16T12:55:00Z
8
value 0.00348
scoring_system epss
scoring_elements 0.57399
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4055
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228367
reference_id 2228367
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2228367
11
reference_url https://www.debian.org/security/2023/dsa-5464
reference_id dsa-5464
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/
url https://www.debian.org/security/2023/dsa-5464
12
reference_url https://www.debian.org/security/2023/dsa-5469
reference_id dsa-5469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/
url https://www.debian.org/security/2023/dsa-5469
13
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
15
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
reference_id mfsa2023-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
17
reference_url https://www.mozilla.org/security/advisories/mfsa2023-30/
reference_id mfsa2023-30
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/
url https://www.mozilla.org/security/advisories/mfsa2023-30/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
reference_id mfsa2023-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
19
reference_url https://www.mozilla.org/security/advisories/mfsa2023-31/
reference_id mfsa2023-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/
url https://www.mozilla.org/security/advisories/mfsa2023-31/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
reference_id mfsa2023-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
reference_id mfsa2023-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
22
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
23
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
24
reference_url https://access.redhat.com/errata/RHSA-2023:4460
reference_id RHSA-2023:4460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4460
25
reference_url https://access.redhat.com/errata/RHSA-2023:4461
reference_id RHSA-2023:4461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4461
26
reference_url https://access.redhat.com/errata/RHSA-2023:4462
reference_id RHSA-2023:4462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4462
27
reference_url https://access.redhat.com/errata/RHSA-2023:4463
reference_id RHSA-2023:4463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4463
28
reference_url https://access.redhat.com/errata/RHSA-2023:4464
reference_id RHSA-2023:4464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4464
29
reference_url https://access.redhat.com/errata/RHSA-2023:4465
reference_id RHSA-2023:4465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4465
30
reference_url https://access.redhat.com/errata/RHSA-2023:4468
reference_id RHSA-2023:4468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4468
31
reference_url https://access.redhat.com/errata/RHSA-2023:4469
reference_id RHSA-2023:4469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4469
32
reference_url https://access.redhat.com/errata/RHSA-2023:4492
reference_id RHSA-2023:4492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4492
33
reference_url https://access.redhat.com/errata/RHSA-2023:4493
reference_id RHSA-2023:4493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4493
34
reference_url https://access.redhat.com/errata/RHSA-2023:4494
reference_id RHSA-2023:4494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4494
35
reference_url https://access.redhat.com/errata/RHSA-2023:4495
reference_id RHSA-2023:4495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4495
36
reference_url https://access.redhat.com/errata/RHSA-2023:4496
reference_id RHSA-2023:4496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4496
37
reference_url https://access.redhat.com/errata/RHSA-2023:4497
reference_id RHSA-2023:4497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4497
38
reference_url https://access.redhat.com/errata/RHSA-2023:4499
reference_id RHSA-2023:4499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4499
39
reference_url https://access.redhat.com/errata/RHSA-2023:4500
reference_id RHSA-2023:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4500
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1782561
reference_id show_bug.cgi?id=1782561
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1782561
41
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
42
reference_url https://usn.ubuntu.com/6333-1/
reference_id USN-6333-1
reference_type
scores
url https://usn.ubuntu.com/6333-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4055
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-32pc-j3he-pffx
4
url VCID-4f4y-p7h8-dygq
vulnerability_id VCID-4f4y-p7h8-dygq
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5728.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5728.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5728
reference_id
reference_type
scores
0
value 0.00352
scoring_system epss
scoring_elements 0.57622
published_at 2026-04-21T12:55:00Z
1
value 0.00525
scoring_system epss
scoring_elements 0.66962
published_at 2026-04-04T12:55:00Z
2
value 0.00525
scoring_system epss
scoring_elements 0.67021
published_at 2026-04-18T12:55:00Z
3
value 0.00525
scoring_system epss
scoring_elements 0.66998
published_at 2026-04-09T12:55:00Z
4
value 0.00525
scoring_system epss
scoring_elements 0.66986
published_at 2026-04-08T12:55:00Z
5
value 0.00525
scoring_system epss
scoring_elements 0.66937
published_at 2026-04-07T12:55:00Z
6
value 0.00525
scoring_system epss
scoring_elements 0.66936
published_at 2026-04-02T12:55:00Z
7
value 0.00525
scoring_system epss
scoring_elements 0.67006
published_at 2026-04-16T12:55:00Z
8
value 0.00525
scoring_system epss
scoring_elements 0.66973
published_at 2026-04-13T12:55:00Z
9
value 0.00525
scoring_system epss
scoring_elements 0.67004
published_at 2026-04-12T12:55:00Z
10
value 0.00525
scoring_system epss
scoring_elements 0.67018
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5728
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245903
reference_id 2245903
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245903
10
reference_url https://www.debian.org/security/2023/dsa-5535
reference_id dsa-5535
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/
url https://www.debian.org/security/2023/dsa-5535
11
reference_url https://www.debian.org/security/2023/dsa-5538
reference_id dsa-5538
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/
url https://www.debian.org/security/2023/dsa-5538
12
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-45
reference_id mfsa2023-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-45
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-45/
reference_id mfsa2023-45
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/
url https://www.mozilla.org/security/advisories/mfsa2023-45/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-46
reference_id mfsa2023-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-46
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-46/
reference_id mfsa2023-46
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/
url https://www.mozilla.org/security/advisories/mfsa2023-46/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-47
reference_id mfsa2023-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-47
18
reference_url https://www.mozilla.org/security/advisories/mfsa2023-47/
reference_id mfsa2023-47
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/
url https://www.mozilla.org/security/advisories/mfsa2023-47/
19
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html
reference_id msg00037.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html
20
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html
reference_id msg00042.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html
21
reference_url https://access.redhat.com/errata/RHSA-2023:6162
reference_id RHSA-2023:6162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6162
22
reference_url https://access.redhat.com/errata/RHSA-2023:6185
reference_id RHSA-2023:6185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6185
23
reference_url https://access.redhat.com/errata/RHSA-2023:6186
reference_id RHSA-2023:6186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6186
24
reference_url https://access.redhat.com/errata/RHSA-2023:6187
reference_id RHSA-2023:6187
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6187
25
reference_url https://access.redhat.com/errata/RHSA-2023:6188
reference_id RHSA-2023:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6188
26
reference_url https://access.redhat.com/errata/RHSA-2023:6189
reference_id RHSA-2023:6189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6189
27
reference_url https://access.redhat.com/errata/RHSA-2023:6191
reference_id RHSA-2023:6191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6191
28
reference_url https://access.redhat.com/errata/RHSA-2023:6194
reference_id RHSA-2023:6194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6194
29
reference_url https://access.redhat.com/errata/RHSA-2023:6195
reference_id RHSA-2023:6195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6195
30
reference_url https://access.redhat.com/errata/RHSA-2023:6196
reference_id RHSA-2023:6196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6196
31
reference_url https://access.redhat.com/errata/RHSA-2023:6197
reference_id RHSA-2023:6197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6197
32
reference_url https://access.redhat.com/errata/RHSA-2023:6198
reference_id RHSA-2023:6198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6198
33
reference_url https://access.redhat.com/errata/RHSA-2023:6199
reference_id RHSA-2023:6199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6199
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1852729
reference_id show_bug.cgi?id=1852729
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1852729
35
reference_url https://usn.ubuntu.com/6456-1/
reference_id USN-6456-1
reference_type
scores
url https://usn.ubuntu.com/6456-1/
36
reference_url https://usn.ubuntu.com/6468-1/
reference_id USN-6468-1
reference_type
scores
url https://usn.ubuntu.com/6468-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-5728
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4f4y-p7h8-dygq
5
url VCID-52ha-qvpu-ruc8
vulnerability_id VCID-52ha-qvpu-ruc8
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37208.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-37208
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13791
published_at 2026-04-13T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13701
published_at 2026-04-16T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.1398
published_at 2026-04-04T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13783
published_at 2026-04-07T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13867
published_at 2026-04-08T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13919
published_at 2026-04-09T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13876
published_at 2026-04-11T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13839
published_at 2026-04-12T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13924
published_at 2026-04-02T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13767
published_at 2026-04-21T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13695
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-37208
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2219750
reference_id 2219750
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2219750
8
reference_url https://www.debian.org/security/2023/dsa-5450
reference_id dsa-5450
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/
url https://www.debian.org/security/2023/dsa-5450
9
reference_url https://www.debian.org/security/2023/dsa-5451
reference_id dsa-5451
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/
url https://www.debian.org/security/2023/dsa-5451
10
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
reference_id mfsa2023-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
12
reference_url https://www.mozilla.org/security/advisories/mfsa2023-22/
reference_id mfsa2023-22
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/
url https://www.mozilla.org/security/advisories/mfsa2023-22/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-23
reference_id mfsa2023-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-23
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-23/
reference_id mfsa2023-23
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/
url https://www.mozilla.org/security/advisories/mfsa2023-23/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-24
reference_id mfsa2023-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-24
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-24/
reference_id mfsa2023-24
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/
url https://www.mozilla.org/security/advisories/mfsa2023-24/
17
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html
18
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html
19
reference_url https://access.redhat.com/errata/RHSA-2023:4062
reference_id RHSA-2023:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4062
20
reference_url https://access.redhat.com/errata/RHSA-2023:4063
reference_id RHSA-2023:4063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4063
21
reference_url https://access.redhat.com/errata/RHSA-2023:4064
reference_id RHSA-2023:4064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4064
22
reference_url https://access.redhat.com/errata/RHSA-2023:4065
reference_id RHSA-2023:4065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4065
23
reference_url https://access.redhat.com/errata/RHSA-2023:4066
reference_id RHSA-2023:4066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4066
24
reference_url https://access.redhat.com/errata/RHSA-2023:4067
reference_id RHSA-2023:4067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4067
25
reference_url https://access.redhat.com/errata/RHSA-2023:4068
reference_id RHSA-2023:4068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4068
26
reference_url https://access.redhat.com/errata/RHSA-2023:4069
reference_id RHSA-2023:4069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4069
27
reference_url https://access.redhat.com/errata/RHSA-2023:4070
reference_id RHSA-2023:4070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4070
28
reference_url https://access.redhat.com/errata/RHSA-2023:4071
reference_id RHSA-2023:4071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4071
29
reference_url https://access.redhat.com/errata/RHSA-2023:4072
reference_id RHSA-2023:4072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4072
30
reference_url https://access.redhat.com/errata/RHSA-2023:4073
reference_id RHSA-2023:4073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4073
31
reference_url https://access.redhat.com/errata/RHSA-2023:4074
reference_id RHSA-2023:4074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4074
32
reference_url https://access.redhat.com/errata/RHSA-2023:4075
reference_id RHSA-2023:4075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4075
33
reference_url https://access.redhat.com/errata/RHSA-2023:4076
reference_id RHSA-2023:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4076
34
reference_url https://access.redhat.com/errata/RHSA-2023:4079
reference_id RHSA-2023:4079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4079
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1837675
reference_id show_bug.cgi?id=1837675
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1837675
36
reference_url https://usn.ubuntu.com/6201-1/
reference_id USN-6201-1
reference_type
scores
url https://usn.ubuntu.com/6201-1/
37
reference_url https://usn.ubuntu.com/6214-1/
reference_id USN-6214-1
reference_type
scores
url https://usn.ubuntu.com/6214-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-37208
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-52ha-qvpu-ruc8
6
url VCID-5qf5-d44c-t7gu
vulnerability_id VCID-5qf5-d44c-t7gu
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6862.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6862.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6862
reference_id
reference_type
scores
0
value 0.00367
scoring_system epss
scoring_elements 0.58658
published_at 2026-04-08T12:55:00Z
1
value 0.00367
scoring_system epss
scoring_elements 0.58682
published_at 2026-04-11T12:55:00Z
2
value 0.00367
scoring_system epss
scoring_elements 0.58636
published_at 2026-04-04T12:55:00Z
3
value 0.00367
scoring_system epss
scoring_elements 0.58606
published_at 2026-04-07T12:55:00Z
4
value 0.00367
scoring_system epss
scoring_elements 0.58664
published_at 2026-04-09T12:55:00Z
5
value 0.00367
scoring_system epss
scoring_elements 0.58615
published_at 2026-04-02T12:55:00Z
6
value 0.00367
scoring_system epss
scoring_elements 0.5868
published_at 2026-04-18T12:55:00Z
7
value 0.00367
scoring_system epss
scoring_elements 0.58675
published_at 2026-04-16T12:55:00Z
8
value 0.00367
scoring_system epss
scoring_elements 0.58643
published_at 2026-04-13T12:55:00Z
9
value 0.00367
scoring_system epss
scoring_elements 0.58663
published_at 2026-04-12T12:55:00Z
10
value 0.00441
scoring_system epss
scoring_elements 0.63264
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6862
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255368
reference_id 2255368
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255368
17
reference_url https://www.debian.org/security/2023/dsa-5581
reference_id dsa-5581
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/
url https://www.debian.org/security/2023/dsa-5581
18
reference_url https://www.debian.org/security/2023/dsa-5582
reference_id dsa-5582
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/
url https://www.debian.org/security/2023/dsa-5582
19
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
21
reference_url https://www.mozilla.org/security/advisories/mfsa2023-54/
reference_id mfsa2023-54
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/
url https://www.mozilla.org/security/advisories/mfsa2023-54/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
23
reference_url https://www.mozilla.org/security/advisories/mfsa2023-55/
reference_id mfsa2023-55
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/
url https://www.mozilla.org/security/advisories/mfsa2023-55/
24
reference_url https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html
reference_id msg00020.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/
url https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html
25
reference_url https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/
url https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html
26
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
27
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
28
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
29
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
30
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
31
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
32
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
33
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
34
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
35
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
36
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
37
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
38
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
39
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
40
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
41
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
42
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
43
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
44
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1868042
reference_id show_bug.cgi?id=1868042
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1868042
45
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-6862
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5qf5-d44c-t7gu
7
url VCID-6s88-vfr8-u3hj
vulnerability_id VCID-6s88-vfr8-u3hj
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4585.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4585.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4585
reference_id
reference_type
scores
0
value 0.00191
scoring_system epss
scoring_elements 0.41096
published_at 2026-04-09T12:55:00Z
1
value 0.00191
scoring_system epss
scoring_elements 0.41081
published_at 2026-04-12T12:55:00Z
2
value 0.00191
scoring_system epss
scoring_elements 0.41115
published_at 2026-04-11T12:55:00Z
3
value 0.00191
scoring_system epss
scoring_elements 0.41113
published_at 2026-04-04T12:55:00Z
4
value 0.00191
scoring_system epss
scoring_elements 0.4104
published_at 2026-04-07T12:55:00Z
5
value 0.00191
scoring_system epss
scoring_elements 0.41089
published_at 2026-04-08T12:55:00Z
6
value 0.00191
scoring_system epss
scoring_elements 0.41082
published_at 2026-04-02T12:55:00Z
7
value 0.00191
scoring_system epss
scoring_elements 0.41078
published_at 2026-04-18T12:55:00Z
8
value 0.00191
scoring_system epss
scoring_elements 0.41107
published_at 2026-04-16T12:55:00Z
9
value 0.00191
scoring_system epss
scoring_elements 0.41065
published_at 2026-04-13T12:55:00Z
10
value 0.00203
scoring_system epss
scoring_elements 0.42393
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4585
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236086
reference_id 2236086
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236086
3
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1751583%2C1841082%2C1847904%2C1848999
reference_id buglist.cgi?bug_id=1751583%2C1841082%2C1847904%2C1848999
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T19:08:38Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1751583%2C1841082%2C1847904%2C1848999
4
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
reference_id mfsa2023-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
6
reference_url https://www.mozilla.org/security/advisories/mfsa2023-34/
reference_id mfsa2023-34
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T19:08:38Z/
url https://www.mozilla.org/security/advisories/mfsa2023-34/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
reference_id mfsa2023-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
8
reference_url https://www.mozilla.org/security/advisories/mfsa2023-36/
reference_id mfsa2023-36
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T19:08:38Z/
url https://www.mozilla.org/security/advisories/mfsa2023-36/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
reference_id mfsa2023-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
10
reference_url https://www.mozilla.org/security/advisories/mfsa2023-38/
reference_id mfsa2023-38
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T19:08:38Z/
url https://www.mozilla.org/security/advisories/mfsa2023-38/
11
reference_url https://access.redhat.com/errata/RHSA-2023:4945
reference_id RHSA-2023:4945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4945
12
reference_url https://access.redhat.com/errata/RHSA-2023:4946
reference_id RHSA-2023:4946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4946
13
reference_url https://access.redhat.com/errata/RHSA-2023:4947
reference_id RHSA-2023:4947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4947
14
reference_url https://access.redhat.com/errata/RHSA-2023:4948
reference_id RHSA-2023:4948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4948
15
reference_url https://access.redhat.com/errata/RHSA-2023:4949
reference_id RHSA-2023:4949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4949
16
reference_url https://access.redhat.com/errata/RHSA-2023:4950
reference_id RHSA-2023:4950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4950
17
reference_url https://access.redhat.com/errata/RHSA-2023:4951
reference_id RHSA-2023:4951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4951
18
reference_url https://access.redhat.com/errata/RHSA-2023:4952
reference_id RHSA-2023:4952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4952
19
reference_url https://access.redhat.com/errata/RHSA-2023:4954
reference_id RHSA-2023:4954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4954
20
reference_url https://access.redhat.com/errata/RHSA-2023:4955
reference_id RHSA-2023:4955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4955
21
reference_url https://access.redhat.com/errata/RHSA-2023:4956
reference_id RHSA-2023:4956
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4956
22
reference_url https://access.redhat.com/errata/RHSA-2023:4957
reference_id RHSA-2023:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4957
23
reference_url https://access.redhat.com/errata/RHSA-2023:4958
reference_id RHSA-2023:4958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4958
24
reference_url https://access.redhat.com/errata/RHSA-2023:4959
reference_id RHSA-2023:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4959
25
reference_url https://access.redhat.com/errata/RHSA-2023:5019
reference_id RHSA-2023:5019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5019
26
reference_url https://usn.ubuntu.com/6320-1/
reference_id USN-6320-1
reference_type
scores
url https://usn.ubuntu.com/6320-1/
27
reference_url https://usn.ubuntu.com/6405-1/
reference_id USN-6405-1
reference_type
scores
url https://usn.ubuntu.com/6405-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4585
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6s88-vfr8-u3hj
8
url VCID-6tm9-1vsh-1qa3
vulnerability_id VCID-6tm9-1vsh-1qa3
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4047.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4047.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4047
reference_id
reference_type
scores
0
value 0.00519
scoring_system epss
scoring_elements 0.66804
published_at 2026-04-13T12:55:00Z
1
value 0.00519
scoring_system epss
scoring_elements 0.66837
published_at 2026-04-16T12:55:00Z
2
value 0.00519
scoring_system epss
scoring_elements 0.66851
published_at 2026-04-18T12:55:00Z
3
value 0.00519
scoring_system epss
scoring_elements 0.66767
published_at 2026-04-07T12:55:00Z
4
value 0.00519
scoring_system epss
scoring_elements 0.66816
published_at 2026-04-08T12:55:00Z
5
value 0.00519
scoring_system epss
scoring_elements 0.66795
published_at 2026-04-04T12:55:00Z
6
value 0.00519
scoring_system epss
scoring_elements 0.66769
published_at 2026-04-02T12:55:00Z
7
value 0.00519
scoring_system epss
scoring_elements 0.6683
published_at 2026-04-09T12:55:00Z
8
value 0.00582
scoring_system epss
scoring_elements 0.68966
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4047
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228362
reference_id 2228362
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2228362
11
reference_url https://www.debian.org/security/2023/dsa-5464
reference_id dsa-5464
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/
url https://www.debian.org/security/2023/dsa-5464
12
reference_url https://www.debian.org/security/2023/dsa-5469
reference_id dsa-5469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/
url https://www.debian.org/security/2023/dsa-5469
13
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
15
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
reference_id mfsa2023-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
17
reference_url https://www.mozilla.org/security/advisories/mfsa2023-30/
reference_id mfsa2023-30
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/
url https://www.mozilla.org/security/advisories/mfsa2023-30/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
reference_id mfsa2023-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
19
reference_url https://www.mozilla.org/security/advisories/mfsa2023-31/
reference_id mfsa2023-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/
url https://www.mozilla.org/security/advisories/mfsa2023-31/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
reference_id mfsa2023-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
reference_id mfsa2023-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
22
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
23
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
24
reference_url https://access.redhat.com/errata/RHSA-2023:4460
reference_id RHSA-2023:4460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4460
25
reference_url https://access.redhat.com/errata/RHSA-2023:4461
reference_id RHSA-2023:4461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4461
26
reference_url https://access.redhat.com/errata/RHSA-2023:4462
reference_id RHSA-2023:4462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4462
27
reference_url https://access.redhat.com/errata/RHSA-2023:4463
reference_id RHSA-2023:4463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4463
28
reference_url https://access.redhat.com/errata/RHSA-2023:4464
reference_id RHSA-2023:4464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4464
29
reference_url https://access.redhat.com/errata/RHSA-2023:4465
reference_id RHSA-2023:4465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4465
30
reference_url https://access.redhat.com/errata/RHSA-2023:4468
reference_id RHSA-2023:4468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4468
31
reference_url https://access.redhat.com/errata/RHSA-2023:4469
reference_id RHSA-2023:4469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4469
32
reference_url https://access.redhat.com/errata/RHSA-2023:4492
reference_id RHSA-2023:4492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4492
33
reference_url https://access.redhat.com/errata/RHSA-2023:4493
reference_id RHSA-2023:4493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4493
34
reference_url https://access.redhat.com/errata/RHSA-2023:4494
reference_id RHSA-2023:4494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4494
35
reference_url https://access.redhat.com/errata/RHSA-2023:4495
reference_id RHSA-2023:4495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4495
36
reference_url https://access.redhat.com/errata/RHSA-2023:4496
reference_id RHSA-2023:4496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4496
37
reference_url https://access.redhat.com/errata/RHSA-2023:4497
reference_id RHSA-2023:4497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4497
38
reference_url https://access.redhat.com/errata/RHSA-2023:4499
reference_id RHSA-2023:4499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4499
39
reference_url https://access.redhat.com/errata/RHSA-2023:4500
reference_id RHSA-2023:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4500
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1839073
reference_id show_bug.cgi?id=1839073
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1839073
41
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
42
reference_url https://usn.ubuntu.com/6333-1/
reference_id USN-6333-1
reference_type
scores
url https://usn.ubuntu.com/6333-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4047
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6tm9-1vsh-1qa3
9
url VCID-6zjy-1agk-nbd9
vulnerability_id VCID-6zjy-1agk-nbd9
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5174.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5174.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5174
reference_id
reference_type
scores
0
value 0.00445
scoring_system epss
scoring_elements 0.63452
published_at 2026-04-21T12:55:00Z
1
value 0.00445
scoring_system epss
scoring_elements 0.63466
published_at 2026-04-18T12:55:00Z
2
value 0.00445
scoring_system epss
scoring_elements 0.63397
published_at 2026-04-02T12:55:00Z
3
value 0.00445
scoring_system epss
scoring_elements 0.63458
published_at 2026-04-16T12:55:00Z
4
value 0.00445
scoring_system epss
scoring_elements 0.6346
published_at 2026-04-12T12:55:00Z
5
value 0.00445
scoring_system epss
scoring_elements 0.63476
published_at 2026-04-11T12:55:00Z
6
value 0.00445
scoring_system epss
scoring_elements 0.6339
published_at 2026-04-07T12:55:00Z
7
value 0.00445
scoring_system epss
scoring_elements 0.63441
published_at 2026-04-08T12:55:00Z
8
value 0.00445
scoring_system epss
scoring_elements 0.63424
published_at 2026-04-13T12:55:00Z
9
value 0.00445
scoring_system epss
scoring_elements 0.63459
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5174
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2240895
reference_id 2240895
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2240895
3
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
reference_id mfsa2023-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
5
reference_url https://www.mozilla.org/security/advisories/mfsa2023-41/
reference_id mfsa2023-41
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/
url https://www.mozilla.org/security/advisories/mfsa2023-41/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-42
reference_id mfsa2023-42
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-42
7
reference_url https://www.mozilla.org/security/advisories/mfsa2023-42/
reference_id mfsa2023-42
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/
url https://www.mozilla.org/security/advisories/mfsa2023-42/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-43
reference_id mfsa2023-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-43
9
reference_url https://www.mozilla.org/security/advisories/mfsa2023-43/
reference_id mfsa2023-43
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/
url https://www.mozilla.org/security/advisories/mfsa2023-43/
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1848454
reference_id show_bug.cgi?id=1848454
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1848454
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-5174
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6zjy-1agk-nbd9
10
url VCID-75sb-xb3r-3fa8
vulnerability_id VCID-75sb-xb3r-3fa8
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4573.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4573.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4573
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33472
published_at 2026-04-21T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40787
published_at 2026-04-09T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40771
published_at 2026-04-12T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40804
published_at 2026-04-04T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40729
published_at 2026-04-07T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40779
published_at 2026-04-08T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.40805
published_at 2026-04-11T12:55:00Z
7
value 0.00189
scoring_system epss
scoring_elements 0.40777
published_at 2026-04-02T12:55:00Z
8
value 0.00189
scoring_system epss
scoring_elements 0.40765
published_at 2026-04-18T12:55:00Z
9
value 0.00189
scoring_system epss
scoring_elements 0.40796
published_at 2026-04-16T12:55:00Z
10
value 0.00189
scoring_system epss
scoring_elements 0.40752
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4573
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236071
reference_id 2236071
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236071
8
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
reference_id mfsa2023-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
10
reference_url https://www.mozilla.org/security/advisories/mfsa2023-34/
reference_id mfsa2023-34
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:08:18Z/
url https://www.mozilla.org/security/advisories/mfsa2023-34/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-35
reference_id mfsa2023-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-35
12
reference_url https://www.mozilla.org/security/advisories/mfsa2023-35/
reference_id mfsa2023-35
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:08:18Z/
url https://www.mozilla.org/security/advisories/mfsa2023-35/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
reference_id mfsa2023-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-36/
reference_id mfsa2023-36
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:08:18Z/
url https://www.mozilla.org/security/advisories/mfsa2023-36/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-37
reference_id mfsa2023-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-37
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-37/
reference_id mfsa2023-37
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:08:18Z/
url https://www.mozilla.org/security/advisories/mfsa2023-37/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
reference_id mfsa2023-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
18
reference_url https://www.mozilla.org/security/advisories/mfsa2023-38/
reference_id mfsa2023-38
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:08:18Z/
url https://www.mozilla.org/security/advisories/mfsa2023-38/
19
reference_url https://access.redhat.com/errata/RHSA-2023:4945
reference_id RHSA-2023:4945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4945
20
reference_url https://access.redhat.com/errata/RHSA-2023:4946
reference_id RHSA-2023:4946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4946
21
reference_url https://access.redhat.com/errata/RHSA-2023:4947
reference_id RHSA-2023:4947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4947
22
reference_url https://access.redhat.com/errata/RHSA-2023:4948
reference_id RHSA-2023:4948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4948
23
reference_url https://access.redhat.com/errata/RHSA-2023:4949
reference_id RHSA-2023:4949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4949
24
reference_url https://access.redhat.com/errata/RHSA-2023:4950
reference_id RHSA-2023:4950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4950
25
reference_url https://access.redhat.com/errata/RHSA-2023:4951
reference_id RHSA-2023:4951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4951
26
reference_url https://access.redhat.com/errata/RHSA-2023:4952
reference_id RHSA-2023:4952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4952
27
reference_url https://access.redhat.com/errata/RHSA-2023:4954
reference_id RHSA-2023:4954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4954
28
reference_url https://access.redhat.com/errata/RHSA-2023:4955
reference_id RHSA-2023:4955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4955
29
reference_url https://access.redhat.com/errata/RHSA-2023:4956
reference_id RHSA-2023:4956
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4956
30
reference_url https://access.redhat.com/errata/RHSA-2023:4957
reference_id RHSA-2023:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4957
31
reference_url https://access.redhat.com/errata/RHSA-2023:4958
reference_id RHSA-2023:4958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4958
32
reference_url https://access.redhat.com/errata/RHSA-2023:4959
reference_id RHSA-2023:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4959
33
reference_url https://access.redhat.com/errata/RHSA-2023:5019
reference_id RHSA-2023:5019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5019
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1846687
reference_id show_bug.cgi?id=1846687
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:08:18Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1846687
35
reference_url https://usn.ubuntu.com/6320-1/
reference_id USN-6320-1
reference_type
scores
url https://usn.ubuntu.com/6320-1/
36
reference_url https://usn.ubuntu.com/6368-1/
reference_id USN-6368-1
reference_type
scores
url https://usn.ubuntu.com/6368-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4573
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-75sb-xb3r-3fa8
11
url VCID-7sbd-1n7f-ryed
vulnerability_id VCID-7sbd-1n7f-ryed
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4057.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4057.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4057
reference_id
reference_type
scores
0
value 0.00215
scoring_system epss
scoring_elements 0.44044
published_at 2026-04-21T12:55:00Z
1
value 0.0022
scoring_system epss
scoring_elements 0.4463
published_at 2026-04-04T12:55:00Z
2
value 0.0022
scoring_system epss
scoring_elements 0.44567
published_at 2026-04-07T12:55:00Z
3
value 0.0022
scoring_system epss
scoring_elements 0.44619
published_at 2026-04-08T12:55:00Z
4
value 0.0022
scoring_system epss
scoring_elements 0.44622
published_at 2026-04-09T12:55:00Z
5
value 0.0022
scoring_system epss
scoring_elements 0.44639
published_at 2026-04-11T12:55:00Z
6
value 0.0022
scoring_system epss
scoring_elements 0.4461
published_at 2026-04-13T12:55:00Z
7
value 0.0022
scoring_system epss
scoring_elements 0.44665
published_at 2026-04-16T12:55:00Z
8
value 0.0022
scoring_system epss
scoring_elements 0.44658
published_at 2026-04-18T12:55:00Z
9
value 0.0022
scoring_system epss
scoring_elements 0.44609
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4057
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228371
reference_id 2228371
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2228371
3
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
5
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
reference_id mfsa2023-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
7
reference_url https://www.mozilla.org/security/advisories/mfsa2023-31/
reference_id mfsa2023-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/
url https://www.mozilla.org/security/advisories/mfsa2023-31/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
reference_id mfsa2023-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
9
reference_url https://www.mozilla.org/security/advisories/mfsa2023-33/
reference_id mfsa2023-33
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/
url https://www.mozilla.org/security/advisories/mfsa2023-33/
10
reference_url https://access.redhat.com/errata/RHSA-2023:4460
reference_id RHSA-2023:4460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4460
11
reference_url https://access.redhat.com/errata/RHSA-2023:4461
reference_id RHSA-2023:4461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4461
12
reference_url https://access.redhat.com/errata/RHSA-2023:4462
reference_id RHSA-2023:4462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4462
13
reference_url https://access.redhat.com/errata/RHSA-2023:4463
reference_id RHSA-2023:4463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4463
14
reference_url https://access.redhat.com/errata/RHSA-2023:4464
reference_id RHSA-2023:4464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4464
15
reference_url https://access.redhat.com/errata/RHSA-2023:4465
reference_id RHSA-2023:4465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4465
16
reference_url https://access.redhat.com/errata/RHSA-2023:4468
reference_id RHSA-2023:4468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4468
17
reference_url https://access.redhat.com/errata/RHSA-2023:4469
reference_id RHSA-2023:4469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4469
18
reference_url https://access.redhat.com/errata/RHSA-2023:4492
reference_id RHSA-2023:4492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4492
19
reference_url https://access.redhat.com/errata/RHSA-2023:4493
reference_id RHSA-2023:4493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4493
20
reference_url https://access.redhat.com/errata/RHSA-2023:4494
reference_id RHSA-2023:4494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4494
21
reference_url https://access.redhat.com/errata/RHSA-2023:4495
reference_id RHSA-2023:4495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4495
22
reference_url https://access.redhat.com/errata/RHSA-2023:4496
reference_id RHSA-2023:4496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4496
23
reference_url https://access.redhat.com/errata/RHSA-2023:4497
reference_id RHSA-2023:4497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4497
24
reference_url https://access.redhat.com/errata/RHSA-2023:4499
reference_id RHSA-2023:4499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4499
25
reference_url https://access.redhat.com/errata/RHSA-2023:4500
reference_id RHSA-2023:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4500
26
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1841682
reference_id show_bug.cgi?id=1841682
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1841682
27
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
28
reference_url https://usn.ubuntu.com/6405-1/
reference_id USN-6405-1
reference_type
scores
url https://usn.ubuntu.com/6405-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4057
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7sbd-1n7f-ryed
12
url VCID-7x5h-kej1-e3ef
vulnerability_id VCID-7x5h-kej1-e3ef
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0751.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0751.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0751
reference_id
reference_type
scores
0
value 0.00443
scoring_system epss
scoring_elements 0.63335
published_at 2026-04-08T12:55:00Z
1
value 0.00443
scoring_system epss
scoring_elements 0.63352
published_at 2026-04-16T12:55:00Z
2
value 0.00443
scoring_system epss
scoring_elements 0.63317
published_at 2026-04-13T12:55:00Z
3
value 0.00443
scoring_system epss
scoring_elements 0.63354
published_at 2026-04-12T12:55:00Z
4
value 0.00443
scoring_system epss
scoring_elements 0.6337
published_at 2026-04-11T12:55:00Z
5
value 0.00443
scoring_system epss
scoring_elements 0.63353
published_at 2026-04-09T12:55:00Z
6
value 0.00443
scoring_system epss
scoring_elements 0.63291
published_at 2026-04-02T12:55:00Z
7
value 0.00443
scoring_system epss
scoring_elements 0.63319
published_at 2026-04-04T12:55:00Z
8
value 0.00443
scoring_system epss
scoring_elements 0.63284
published_at 2026-04-07T12:55:00Z
9
value 0.00443
scoring_system epss
scoring_elements 0.63359
published_at 2026-04-18T12:55:00Z
10
value 0.00499
scoring_system epss
scoring_elements 0.65942
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0751
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2259932
reference_id 2259932
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2259932
12
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
13
reference_url https://security.gentoo.org/glsa/202402-26
reference_id GLSA-202402-26
reference_type
scores
url https://security.gentoo.org/glsa/202402-26
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
reference_id mfsa2024-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-01/
reference_id mfsa2024-01
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/
url https://www.mozilla.org/security/advisories/mfsa2024-01/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-02
reference_id mfsa2024-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-02
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-02/
reference_id mfsa2024-02
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/
url https://www.mozilla.org/security/advisories/mfsa2024-02/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-04
reference_id mfsa2024-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-04
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-04/
reference_id mfsa2024-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/
url https://www.mozilla.org/security/advisories/mfsa2024-04/
20
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html
21
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html
22
reference_url https://access.redhat.com/errata/RHSA-2024:0559
reference_id RHSA-2024:0559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0559
23
reference_url https://access.redhat.com/errata/RHSA-2024:0565
reference_id RHSA-2024:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0565
24
reference_url https://access.redhat.com/errata/RHSA-2024:0596
reference_id RHSA-2024:0596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0596
25
reference_url https://access.redhat.com/errata/RHSA-2024:0598
reference_id RHSA-2024:0598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0598
26
reference_url https://access.redhat.com/errata/RHSA-2024:0600
reference_id RHSA-2024:0600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0600
27
reference_url https://access.redhat.com/errata/RHSA-2024:0601
reference_id RHSA-2024:0601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0601
28
reference_url https://access.redhat.com/errata/RHSA-2024:0602
reference_id RHSA-2024:0602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0602
29
reference_url https://access.redhat.com/errata/RHSA-2024:0603
reference_id RHSA-2024:0603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0603
30
reference_url https://access.redhat.com/errata/RHSA-2024:0604
reference_id RHSA-2024:0604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0604
31
reference_url https://access.redhat.com/errata/RHSA-2024:0605
reference_id RHSA-2024:0605
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0605
32
reference_url https://access.redhat.com/errata/RHSA-2024:0608
reference_id RHSA-2024:0608
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0608
33
reference_url https://access.redhat.com/errata/RHSA-2024:0609
reference_id RHSA-2024:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0609
34
reference_url https://access.redhat.com/errata/RHSA-2024:0615
reference_id RHSA-2024:0615
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0615
35
reference_url https://access.redhat.com/errata/RHSA-2024:0616
reference_id RHSA-2024:0616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0616
36
reference_url https://access.redhat.com/errata/RHSA-2024:0618
reference_id RHSA-2024:0618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0618
37
reference_url https://access.redhat.com/errata/RHSA-2024:0619
reference_id RHSA-2024:0619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0619
38
reference_url https://access.redhat.com/errata/RHSA-2024:0622
reference_id RHSA-2024:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0622
39
reference_url https://access.redhat.com/errata/RHSA-2024:0623
reference_id RHSA-2024:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0623
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1865689
reference_id show_bug.cgi?id=1865689
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1865689
41
reference_url https://usn.ubuntu.com/6610-1/
reference_id USN-6610-1
reference_type
scores
url https://usn.ubuntu.com/6610-1/
42
reference_url https://usn.ubuntu.com/6669-1/
reference_id USN-6669-1
reference_type
scores
url https://usn.ubuntu.com/6669-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2024-0751
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7x5h-kej1-e3ef
13
url VCID-878b-mn4w-wkg4
vulnerability_id VCID-878b-mn4w-wkg4
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4049.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4049.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4049
reference_id
reference_type
scores
0
value 0.00214
scoring_system epss
scoring_elements 0.43947
published_at 2026-04-21T12:55:00Z
1
value 0.00296
scoring_system epss
scoring_elements 0.52944
published_at 2026-04-16T12:55:00Z
2
value 0.00296
scoring_system epss
scoring_elements 0.52907
published_at 2026-04-13T12:55:00Z
3
value 0.00296
scoring_system epss
scoring_elements 0.5285
published_at 2026-04-02T12:55:00Z
4
value 0.00296
scoring_system epss
scoring_elements 0.52876
published_at 2026-04-04T12:55:00Z
5
value 0.00296
scoring_system epss
scoring_elements 0.52951
published_at 2026-04-18T12:55:00Z
6
value 0.00296
scoring_system epss
scoring_elements 0.52939
published_at 2026-04-11T12:55:00Z
7
value 0.00296
scoring_system epss
scoring_elements 0.52889
published_at 2026-04-09T12:55:00Z
8
value 0.00296
scoring_system epss
scoring_elements 0.52895
published_at 2026-04-08T12:55:00Z
9
value 0.00296
scoring_system epss
scoring_elements 0.52844
published_at 2026-04-07T12:55:00Z
10
value 0.00296
scoring_system epss
scoring_elements 0.52923
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4049
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228364
reference_id 2228364
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2228364
11
reference_url https://www.debian.org/security/2023/dsa-5464
reference_id dsa-5464
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/
url https://www.debian.org/security/2023/dsa-5464
12
reference_url https://www.debian.org/security/2023/dsa-5469
reference_id dsa-5469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/
url https://www.debian.org/security/2023/dsa-5469
13
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
15
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
reference_id mfsa2023-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
17
reference_url https://www.mozilla.org/security/advisories/mfsa2023-30/
reference_id mfsa2023-30
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/
url https://www.mozilla.org/security/advisories/mfsa2023-30/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
reference_id mfsa2023-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
19
reference_url https://www.mozilla.org/security/advisories/mfsa2023-31/
reference_id mfsa2023-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/
url https://www.mozilla.org/security/advisories/mfsa2023-31/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
reference_id mfsa2023-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
reference_id mfsa2023-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
22
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
23
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
24
reference_url https://access.redhat.com/errata/RHSA-2023:4460
reference_id RHSA-2023:4460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4460
25
reference_url https://access.redhat.com/errata/RHSA-2023:4461
reference_id RHSA-2023:4461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4461
26
reference_url https://access.redhat.com/errata/RHSA-2023:4462
reference_id RHSA-2023:4462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4462
27
reference_url https://access.redhat.com/errata/RHSA-2023:4463
reference_id RHSA-2023:4463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4463
28
reference_url https://access.redhat.com/errata/RHSA-2023:4464
reference_id RHSA-2023:4464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4464
29
reference_url https://access.redhat.com/errata/RHSA-2023:4465
reference_id RHSA-2023:4465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4465
30
reference_url https://access.redhat.com/errata/RHSA-2023:4468
reference_id RHSA-2023:4468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4468
31
reference_url https://access.redhat.com/errata/RHSA-2023:4469
reference_id RHSA-2023:4469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4469
32
reference_url https://access.redhat.com/errata/RHSA-2023:4492
reference_id RHSA-2023:4492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4492
33
reference_url https://access.redhat.com/errata/RHSA-2023:4493
reference_id RHSA-2023:4493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4493
34
reference_url https://access.redhat.com/errata/RHSA-2023:4494
reference_id RHSA-2023:4494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4494
35
reference_url https://access.redhat.com/errata/RHSA-2023:4495
reference_id RHSA-2023:4495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4495
36
reference_url https://access.redhat.com/errata/RHSA-2023:4496
reference_id RHSA-2023:4496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4496
37
reference_url https://access.redhat.com/errata/RHSA-2023:4497
reference_id RHSA-2023:4497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4497
38
reference_url https://access.redhat.com/errata/RHSA-2023:4499
reference_id RHSA-2023:4499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4499
39
reference_url https://access.redhat.com/errata/RHSA-2023:4500
reference_id RHSA-2023:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4500
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1842658
reference_id show_bug.cgi?id=1842658
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1842658
41
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
42
reference_url https://usn.ubuntu.com/6333-1/
reference_id USN-6333-1
reference_type
scores
url https://usn.ubuntu.com/6333-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4049
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-878b-mn4w-wkg4
14
url VCID-87mf-fznn-m3gy
vulnerability_id VCID-87mf-fznn-m3gy
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6205.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6205.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6205
reference_id
reference_type
scores
0
value 0.00414
scoring_system epss
scoring_elements 0.61649
published_at 2026-04-21T12:55:00Z
1
value 0.00414
scoring_system epss
scoring_elements 0.61664
published_at 2026-04-18T12:55:00Z
2
value 0.00414
scoring_system epss
scoring_elements 0.61565
published_at 2026-04-02T12:55:00Z
3
value 0.00414
scoring_system epss
scoring_elements 0.61564
published_at 2026-04-07T12:55:00Z
4
value 0.00414
scoring_system epss
scoring_elements 0.61594
published_at 2026-04-04T12:55:00Z
5
value 0.00414
scoring_system epss
scoring_elements 0.61613
published_at 2026-04-08T12:55:00Z
6
value 0.00414
scoring_system epss
scoring_elements 0.61659
published_at 2026-04-16T12:55:00Z
7
value 0.00414
scoring_system epss
scoring_elements 0.61617
published_at 2026-04-13T12:55:00Z
8
value 0.00414
scoring_system epss
scoring_elements 0.61637
published_at 2026-04-12T12:55:00Z
9
value 0.00414
scoring_system epss
scoring_elements 0.61648
published_at 2026-04-11T12:55:00Z
10
value 0.00414
scoring_system epss
scoring_elements 0.61627
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6205
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2250897
reference_id 2250897
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2250897
10
reference_url https://www.debian.org/security/2023/dsa-5561
reference_id dsa-5561
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/
url https://www.debian.org/security/2023/dsa-5561
11
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
reference_id mfsa2023-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
13
reference_url https://www.mozilla.org/security/advisories/mfsa2023-49/
reference_id mfsa2023-49
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/
url https://www.mozilla.org/security/advisories/mfsa2023-49/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-50
reference_id mfsa2023-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-50
15
reference_url https://www.mozilla.org/security/advisories/mfsa2023-50/
reference_id mfsa2023-50
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/
url https://www.mozilla.org/security/advisories/mfsa2023-50/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-52
reference_id mfsa2023-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-52
17
reference_url https://www.mozilla.org/security/advisories/mfsa2023-52/
reference_id mfsa2023-52
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/
url https://www.mozilla.org/security/advisories/mfsa2023-52/
18
reference_url https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/
url https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html
19
reference_url https://lists.debian.org/debian-lts-announce/2023/11/msg00030.html
reference_id msg00030.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/
url https://lists.debian.org/debian-lts-announce/2023/11/msg00030.html
20
reference_url https://access.redhat.com/errata/RHSA-2023:7499
reference_id RHSA-2023:7499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7499
21
reference_url https://access.redhat.com/errata/RHSA-2023:7500
reference_id RHSA-2023:7500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7500
22
reference_url https://access.redhat.com/errata/RHSA-2023:7501
reference_id RHSA-2023:7501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7501
23
reference_url https://access.redhat.com/errata/RHSA-2023:7502
reference_id RHSA-2023:7502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7502
24
reference_url https://access.redhat.com/errata/RHSA-2023:7503
reference_id RHSA-2023:7503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7503
25
reference_url https://access.redhat.com/errata/RHSA-2023:7504
reference_id RHSA-2023:7504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7504
26
reference_url https://access.redhat.com/errata/RHSA-2023:7505
reference_id RHSA-2023:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7505
27
reference_url https://access.redhat.com/errata/RHSA-2023:7506
reference_id RHSA-2023:7506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7506
28
reference_url https://access.redhat.com/errata/RHSA-2023:7507
reference_id RHSA-2023:7507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7507
29
reference_url https://access.redhat.com/errata/RHSA-2023:7508
reference_id RHSA-2023:7508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7508
30
reference_url https://access.redhat.com/errata/RHSA-2023:7509
reference_id RHSA-2023:7509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7509
31
reference_url https://access.redhat.com/errata/RHSA-2023:7510
reference_id RHSA-2023:7510
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7510
32
reference_url https://access.redhat.com/errata/RHSA-2023:7511
reference_id RHSA-2023:7511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7511
33
reference_url https://access.redhat.com/errata/RHSA-2023:7512
reference_id RHSA-2023:7512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7512
34
reference_url https://access.redhat.com/errata/RHSA-2023:7547
reference_id RHSA-2023:7547
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7547
35
reference_url https://access.redhat.com/errata/RHSA-2023:7569
reference_id RHSA-2023:7569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7569
36
reference_url https://access.redhat.com/errata/RHSA-2023:7570
reference_id RHSA-2023:7570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7570
37
reference_url https://access.redhat.com/errata/RHSA-2023:7573
reference_id RHSA-2023:7573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7573
38
reference_url https://access.redhat.com/errata/RHSA-2023:7574
reference_id RHSA-2023:7574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7574
39
reference_url https://access.redhat.com/errata/RHSA-2023:7577
reference_id RHSA-2023:7577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7577
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1854076
reference_id show_bug.cgi?id=1854076
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1854076
41
reference_url https://usn.ubuntu.com/6509-1/
reference_id USN-6509-1
reference_type
scores
url https://usn.ubuntu.com/6509-1/
42
reference_url https://usn.ubuntu.com/6515-1/
reference_id USN-6515-1
reference_type
scores
url https://usn.ubuntu.com/6515-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-6205
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-87mf-fznn-m3gy
15
url VCID-8dgu-ppan-9ub2
vulnerability_id VCID-8dgu-ppan-9ub2
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4048.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4048.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4048
reference_id
reference_type
scores
0
value 0.00308
scoring_system epss
scoring_elements 0.54021
published_at 2026-04-21T12:55:00Z
1
value 0.00459
scoring_system epss
scoring_elements 0.6407
published_at 2026-04-16T12:55:00Z
2
value 0.00459
scoring_system epss
scoring_elements 0.64036
published_at 2026-04-13T12:55:00Z
3
value 0.00459
scoring_system epss
scoring_elements 0.64012
published_at 2026-04-02T12:55:00Z
4
value 0.00459
scoring_system epss
scoring_elements 0.6404
published_at 2026-04-04T12:55:00Z
5
value 0.00459
scoring_system epss
scoring_elements 0.64082
published_at 2026-04-18T12:55:00Z
6
value 0.00459
scoring_system epss
scoring_elements 0.64079
published_at 2026-04-11T12:55:00Z
7
value 0.00459
scoring_system epss
scoring_elements 0.64067
published_at 2026-04-09T12:55:00Z
8
value 0.00459
scoring_system epss
scoring_elements 0.64051
published_at 2026-04-08T12:55:00Z
9
value 0.00459
scoring_system epss
scoring_elements 0.64
published_at 2026-04-07T12:55:00Z
10
value 0.00459
scoring_system epss
scoring_elements 0.64065
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4048
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228363
reference_id 2228363
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2228363
11
reference_url https://www.debian.org/security/2023/dsa-5464
reference_id dsa-5464
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/
url https://www.debian.org/security/2023/dsa-5464
12
reference_url https://www.debian.org/security/2023/dsa-5469
reference_id dsa-5469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/
url https://www.debian.org/security/2023/dsa-5469
13
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
15
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
reference_id mfsa2023-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
17
reference_url https://www.mozilla.org/security/advisories/mfsa2023-30/
reference_id mfsa2023-30
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/
url https://www.mozilla.org/security/advisories/mfsa2023-30/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
reference_id mfsa2023-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
19
reference_url https://www.mozilla.org/security/advisories/mfsa2023-31/
reference_id mfsa2023-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/
url https://www.mozilla.org/security/advisories/mfsa2023-31/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
reference_id mfsa2023-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
reference_id mfsa2023-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
22
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
23
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
24
reference_url https://access.redhat.com/errata/RHSA-2023:4460
reference_id RHSA-2023:4460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4460
25
reference_url https://access.redhat.com/errata/RHSA-2023:4461
reference_id RHSA-2023:4461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4461
26
reference_url https://access.redhat.com/errata/RHSA-2023:4462
reference_id RHSA-2023:4462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4462
27
reference_url https://access.redhat.com/errata/RHSA-2023:4463
reference_id RHSA-2023:4463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4463
28
reference_url https://access.redhat.com/errata/RHSA-2023:4464
reference_id RHSA-2023:4464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4464
29
reference_url https://access.redhat.com/errata/RHSA-2023:4465
reference_id RHSA-2023:4465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4465
30
reference_url https://access.redhat.com/errata/RHSA-2023:4468
reference_id RHSA-2023:4468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4468
31
reference_url https://access.redhat.com/errata/RHSA-2023:4469
reference_id RHSA-2023:4469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4469
32
reference_url https://access.redhat.com/errata/RHSA-2023:4492
reference_id RHSA-2023:4492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4492
33
reference_url https://access.redhat.com/errata/RHSA-2023:4493
reference_id RHSA-2023:4493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4493
34
reference_url https://access.redhat.com/errata/RHSA-2023:4494
reference_id RHSA-2023:4494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4494
35
reference_url https://access.redhat.com/errata/RHSA-2023:4495
reference_id RHSA-2023:4495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4495
36
reference_url https://access.redhat.com/errata/RHSA-2023:4496
reference_id RHSA-2023:4496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4496
37
reference_url https://access.redhat.com/errata/RHSA-2023:4497
reference_id RHSA-2023:4497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4497
38
reference_url https://access.redhat.com/errata/RHSA-2023:4499
reference_id RHSA-2023:4499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4499
39
reference_url https://access.redhat.com/errata/RHSA-2023:4500
reference_id RHSA-2023:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4500
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1841368
reference_id show_bug.cgi?id=1841368
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1841368
41
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
42
reference_url https://usn.ubuntu.com/6333-1/
reference_id USN-6333-1
reference_type
scores
url https://usn.ubuntu.com/6333-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4048
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8dgu-ppan-9ub2
16
url VCID-8fny-dsut-7ba3
vulnerability_id VCID-8fny-dsut-7ba3
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5171.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5171.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5171
reference_id
reference_type
scores
0
value 0.0026
scoring_system epss
scoring_elements 0.49411
published_at 2026-04-21T12:55:00Z
1
value 0.0026
scoring_system epss
scoring_elements 0.49441
published_at 2026-04-18T12:55:00Z
2
value 0.0026
scoring_system epss
scoring_elements 0.49374
published_at 2026-04-02T12:55:00Z
3
value 0.0026
scoring_system epss
scoring_elements 0.49401
published_at 2026-04-04T12:55:00Z
4
value 0.0026
scoring_system epss
scoring_elements 0.49405
published_at 2026-04-09T12:55:00Z
5
value 0.0026
scoring_system epss
scoring_elements 0.4941
published_at 2026-04-08T12:55:00Z
6
value 0.0026
scoring_system epss
scoring_elements 0.49355
published_at 2026-04-07T12:55:00Z
7
value 0.0026
scoring_system epss
scoring_elements 0.49444
published_at 2026-04-16T12:55:00Z
8
value 0.0026
scoring_system epss
scoring_elements 0.49398
published_at 2026-04-13T12:55:00Z
9
value 0.0026
scoring_system epss
scoring_elements 0.49396
published_at 2026-04-12T12:55:00Z
10
value 0.0026
scoring_system epss
scoring_elements 0.49423
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5171
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2240894
reference_id 2240894
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2240894
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/
reference_id AY642Z6JZODQJE7Z62CFREVUHEGCXGPD
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/
8
reference_url https://www.debian.org/security/2023/dsa-5506
reference_id dsa-5506
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/
url https://www.debian.org/security/2023/dsa-5506
9
reference_url https://www.debian.org/security/2023/dsa-5513
reference_id dsa-5513
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/
url https://www.debian.org/security/2023/dsa-5513
10
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
reference_id mfsa2023-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
12
reference_url https://www.mozilla.org/security/advisories/mfsa2023-41/
reference_id mfsa2023-41
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/
url https://www.mozilla.org/security/advisories/mfsa2023-41/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-42
reference_id mfsa2023-42
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-42
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-42/
reference_id mfsa2023-42
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/
url https://www.mozilla.org/security/advisories/mfsa2023-42/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-43
reference_id mfsa2023-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-43
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-43/
reference_id mfsa2023-43
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/
url https://www.mozilla.org/security/advisories/mfsa2023-43/
17
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html
18
reference_url https://access.redhat.com/errata/RHSA-2023:5426
reference_id RHSA-2023:5426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5426
19
reference_url https://access.redhat.com/errata/RHSA-2023:5427
reference_id RHSA-2023:5427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5427
20
reference_url https://access.redhat.com/errata/RHSA-2023:5428
reference_id RHSA-2023:5428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5428
21
reference_url https://access.redhat.com/errata/RHSA-2023:5429
reference_id RHSA-2023:5429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5429
22
reference_url https://access.redhat.com/errata/RHSA-2023:5430
reference_id RHSA-2023:5430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5430
23
reference_url https://access.redhat.com/errata/RHSA-2023:5432
reference_id RHSA-2023:5432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5432
24
reference_url https://access.redhat.com/errata/RHSA-2023:5433
reference_id RHSA-2023:5433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5433
25
reference_url https://access.redhat.com/errata/RHSA-2023:5434
reference_id RHSA-2023:5434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5434
26
reference_url https://access.redhat.com/errata/RHSA-2023:5435
reference_id RHSA-2023:5435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5435
27
reference_url https://access.redhat.com/errata/RHSA-2023:5436
reference_id RHSA-2023:5436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5436
28
reference_url https://access.redhat.com/errata/RHSA-2023:5437
reference_id RHSA-2023:5437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5437
29
reference_url https://access.redhat.com/errata/RHSA-2023:5438
reference_id RHSA-2023:5438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5438
30
reference_url https://access.redhat.com/errata/RHSA-2023:5439
reference_id RHSA-2023:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5439
31
reference_url https://access.redhat.com/errata/RHSA-2023:5440
reference_id RHSA-2023:5440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5440
32
reference_url https://access.redhat.com/errata/RHSA-2023:5475
reference_id RHSA-2023:5475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5475
33
reference_url https://access.redhat.com/errata/RHSA-2023:5477
reference_id RHSA-2023:5477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5477
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1851599
reference_id show_bug.cgi?id=1851599
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1851599
35
reference_url https://usn.ubuntu.com/6404-1/
reference_id USN-6404-1
reference_type
scores
url https://usn.ubuntu.com/6404-1/
36
reference_url https://usn.ubuntu.com/6405-1/
reference_id USN-6405-1
reference_type
scores
url https://usn.ubuntu.com/6405-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-5171
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8fny-dsut-7ba3
17
url VCID-8m89-ma2u-5fgu
vulnerability_id VCID-8m89-ma2u-5fgu
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5730.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5730.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5730
reference_id
reference_type
scores
0
value 0.00444
scoring_system epss
scoring_elements 0.63392
published_at 2026-04-21T12:55:00Z
1
value 0.00489
scoring_system epss
scoring_elements 0.65553
published_at 2026-04-08T12:55:00Z
2
value 0.00489
scoring_system epss
scoring_elements 0.6559
published_at 2026-04-18T12:55:00Z
3
value 0.00489
scoring_system epss
scoring_elements 0.6557
published_at 2026-04-12T12:55:00Z
4
value 0.00489
scoring_system epss
scoring_elements 0.65583
published_at 2026-04-11T12:55:00Z
5
value 0.00489
scoring_system epss
scoring_elements 0.65535
published_at 2026-04-04T12:55:00Z
6
value 0.00489
scoring_system epss
scoring_elements 0.655
published_at 2026-04-07T12:55:00Z
7
value 0.00489
scoring_system epss
scoring_elements 0.65564
published_at 2026-04-09T12:55:00Z
8
value 0.00489
scoring_system epss
scoring_elements 0.65507
published_at 2026-04-02T12:55:00Z
9
value 0.00489
scoring_system epss
scoring_elements 0.65578
published_at 2026-04-16T12:55:00Z
10
value 0.00489
scoring_system epss
scoring_elements 0.65542
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5730
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245906
reference_id 2245906
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245906
10
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1836607%2C1840918%2C1848694%2C1848833%2C1850191%2C1850259%2C1852596%2C1853201%2C1854002%2C1855306%2C1855640%2C1856695
reference_id buglist.cgi?bug_id=1836607%2C1840918%2C1848694%2C1848833%2C1850191%2C1850259%2C1852596%2C1853201%2C1854002%2C1855306%2C1855640%2C1856695
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1836607%2C1840918%2C1848694%2C1848833%2C1850191%2C1850259%2C1852596%2C1853201%2C1854002%2C1855306%2C1855640%2C1856695
11
reference_url https://www.debian.org/security/2023/dsa-5535
reference_id dsa-5535
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/
url https://www.debian.org/security/2023/dsa-5535
12
reference_url https://www.debian.org/security/2023/dsa-5538
reference_id dsa-5538
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/
url https://www.debian.org/security/2023/dsa-5538
13
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-45
reference_id mfsa2023-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-45
15
reference_url https://www.mozilla.org/security/advisories/mfsa2023-45/
reference_id mfsa2023-45
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/
url https://www.mozilla.org/security/advisories/mfsa2023-45/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-46
reference_id mfsa2023-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-46
17
reference_url https://www.mozilla.org/security/advisories/mfsa2023-46/
reference_id mfsa2023-46
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/
url https://www.mozilla.org/security/advisories/mfsa2023-46/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-47
reference_id mfsa2023-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-47
19
reference_url https://www.mozilla.org/security/advisories/mfsa2023-47/
reference_id mfsa2023-47
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/
url https://www.mozilla.org/security/advisories/mfsa2023-47/
20
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html
reference_id msg00037.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html
21
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html
reference_id msg00042.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html
22
reference_url https://access.redhat.com/errata/RHSA-2023:6162
reference_id RHSA-2023:6162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6162
23
reference_url https://access.redhat.com/errata/RHSA-2023:6185
reference_id RHSA-2023:6185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6185
24
reference_url https://access.redhat.com/errata/RHSA-2023:6186
reference_id RHSA-2023:6186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6186
25
reference_url https://access.redhat.com/errata/RHSA-2023:6187
reference_id RHSA-2023:6187
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6187
26
reference_url https://access.redhat.com/errata/RHSA-2023:6188
reference_id RHSA-2023:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6188
27
reference_url https://access.redhat.com/errata/RHSA-2023:6189
reference_id RHSA-2023:6189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6189
28
reference_url https://access.redhat.com/errata/RHSA-2023:6191
reference_id RHSA-2023:6191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6191
29
reference_url https://access.redhat.com/errata/RHSA-2023:6194
reference_id RHSA-2023:6194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6194
30
reference_url https://access.redhat.com/errata/RHSA-2023:6195
reference_id RHSA-2023:6195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6195
31
reference_url https://access.redhat.com/errata/RHSA-2023:6196
reference_id RHSA-2023:6196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6196
32
reference_url https://access.redhat.com/errata/RHSA-2023:6197
reference_id RHSA-2023:6197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6197
33
reference_url https://access.redhat.com/errata/RHSA-2023:6198
reference_id RHSA-2023:6198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6198
34
reference_url https://access.redhat.com/errata/RHSA-2023:6199
reference_id RHSA-2023:6199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6199
35
reference_url https://usn.ubuntu.com/6456-1/
reference_id USN-6456-1
reference_type
scores
url https://usn.ubuntu.com/6456-1/
36
reference_url https://usn.ubuntu.com/6468-1/
reference_id USN-6468-1
reference_type
scores
url https://usn.ubuntu.com/6468-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-5730
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8m89-ma2u-5fgu
18
url VCID-9dpt-xfu6-cuh5
vulnerability_id VCID-9dpt-xfu6-cuh5
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4580.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4580.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4580
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21165
published_at 2026-04-21T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24142
published_at 2026-04-04T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.23989
published_at 2026-04-08T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.24036
published_at 2026-04-09T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24053
published_at 2026-04-11T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24011
published_at 2026-04-12T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.23954
published_at 2026-04-13T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.23964
published_at 2026-04-16T12:55:00Z
8
value 0.00082
scoring_system epss
scoring_elements 0.23952
published_at 2026-04-18T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.24104
published_at 2026-04-02T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.23923
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4580
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236079
reference_id 2236079
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236079
3
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
reference_id mfsa2023-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
5
reference_url https://www.mozilla.org/security/advisories/mfsa2023-34/
reference_id mfsa2023-34
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:01:48Z/
url https://www.mozilla.org/security/advisories/mfsa2023-34/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
reference_id mfsa2023-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
7
reference_url https://www.mozilla.org/security/advisories/mfsa2023-36/
reference_id mfsa2023-36
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:01:48Z/
url https://www.mozilla.org/security/advisories/mfsa2023-36/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
reference_id mfsa2023-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
9
reference_url https://www.mozilla.org/security/advisories/mfsa2023-38/
reference_id mfsa2023-38
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:01:48Z/
url https://www.mozilla.org/security/advisories/mfsa2023-38/
10
reference_url https://access.redhat.com/errata/RHSA-2023:4945
reference_id RHSA-2023:4945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4945
11
reference_url https://access.redhat.com/errata/RHSA-2023:4946
reference_id RHSA-2023:4946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4946
12
reference_url https://access.redhat.com/errata/RHSA-2023:4947
reference_id RHSA-2023:4947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4947
13
reference_url https://access.redhat.com/errata/RHSA-2023:4948
reference_id RHSA-2023:4948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4948
14
reference_url https://access.redhat.com/errata/RHSA-2023:4949
reference_id RHSA-2023:4949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4949
15
reference_url https://access.redhat.com/errata/RHSA-2023:4950
reference_id RHSA-2023:4950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4950
16
reference_url https://access.redhat.com/errata/RHSA-2023:4951
reference_id RHSA-2023:4951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4951
17
reference_url https://access.redhat.com/errata/RHSA-2023:4952
reference_id RHSA-2023:4952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4952
18
reference_url https://access.redhat.com/errata/RHSA-2023:4954
reference_id RHSA-2023:4954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4954
19
reference_url https://access.redhat.com/errata/RHSA-2023:4955
reference_id RHSA-2023:4955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4955
20
reference_url https://access.redhat.com/errata/RHSA-2023:4956
reference_id RHSA-2023:4956
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4956
21
reference_url https://access.redhat.com/errata/RHSA-2023:4957
reference_id RHSA-2023:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4957
22
reference_url https://access.redhat.com/errata/RHSA-2023:4958
reference_id RHSA-2023:4958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4958
23
reference_url https://access.redhat.com/errata/RHSA-2023:4959
reference_id RHSA-2023:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4959
24
reference_url https://access.redhat.com/errata/RHSA-2023:5019
reference_id RHSA-2023:5019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5019
25
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1843046
reference_id show_bug.cgi?id=1843046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:01:48Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1843046
26
reference_url https://usn.ubuntu.com/6320-1/
reference_id USN-6320-1
reference_type
scores
url https://usn.ubuntu.com/6320-1/
27
reference_url https://usn.ubuntu.com/6405-1/
reference_id USN-6405-1
reference_type
scores
url https://usn.ubuntu.com/6405-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4580
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9dpt-xfu6-cuh5
19
url VCID-9z3s-qfbc-vbdc
vulnerability_id VCID-9z3s-qfbc-vbdc
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6859.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6859.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6859
reference_id
reference_type
scores
0
value 0.00375
scoring_system epss
scoring_elements 0.59175
published_at 2026-04-21T12:55:00Z
1
value 0.00449
scoring_system epss
scoring_elements 0.63625
published_at 2026-04-08T12:55:00Z
2
value 0.00449
scoring_system epss
scoring_elements 0.63608
published_at 2026-04-13T12:55:00Z
3
value 0.00449
scoring_system epss
scoring_elements 0.63645
published_at 2026-04-16T12:55:00Z
4
value 0.00449
scoring_system epss
scoring_elements 0.63654
published_at 2026-04-18T12:55:00Z
5
value 0.00449
scoring_system epss
scoring_elements 0.63583
published_at 2026-04-02T12:55:00Z
6
value 0.00449
scoring_system epss
scoring_elements 0.63609
published_at 2026-04-04T12:55:00Z
7
value 0.00449
scoring_system epss
scoring_elements 0.63573
published_at 2026-04-07T12:55:00Z
8
value 0.00449
scoring_system epss
scoring_elements 0.63641
published_at 2026-04-12T12:55:00Z
9
value 0.00449
scoring_system epss
scoring_elements 0.63656
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6859
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255364
reference_id 2255364
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255364
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-6859
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9z3s-qfbc-vbdc
20
url VCID-apes-5sa9-w7gd
vulnerability_id VCID-apes-5sa9-w7gd
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0755.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0755.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0755
reference_id
reference_type
scores
0
value 0.00646
scoring_system epss
scoring_elements 0.70728
published_at 2026-04-21T12:55:00Z
1
value 0.00757
scoring_system epss
scoring_elements 0.73324
published_at 2026-04-16T12:55:00Z
2
value 0.00757
scoring_system epss
scoring_elements 0.7328
published_at 2026-04-13T12:55:00Z
3
value 0.00757
scoring_system epss
scoring_elements 0.73288
published_at 2026-04-12T12:55:00Z
4
value 0.00757
scoring_system epss
scoring_elements 0.73308
published_at 2026-04-11T12:55:00Z
5
value 0.00757
scoring_system epss
scoring_elements 0.73283
published_at 2026-04-09T12:55:00Z
6
value 0.00757
scoring_system epss
scoring_elements 0.73269
published_at 2026-04-08T12:55:00Z
7
value 0.00757
scoring_system epss
scoring_elements 0.73239
published_at 2026-04-02T12:55:00Z
8
value 0.00757
scoring_system epss
scoring_elements 0.73333
published_at 2026-04-18T12:55:00Z
9
value 0.00757
scoring_system epss
scoring_elements 0.73233
published_at 2026-04-07T12:55:00Z
10
value 0.00757
scoring_system epss
scoring_elements 0.7326
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0755
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2259934
reference_id 2259934
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2259934
12
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701
reference_id buglist.cgi?bug_id=1868456%2C1871445%2C1873701
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701
13
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
14
reference_url https://security.gentoo.org/glsa/202402-26
reference_id GLSA-202402-26
reference_type
scores
url https://security.gentoo.org/glsa/202402-26
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
reference_id mfsa2024-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-01/
reference_id mfsa2024-01
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/
url https://www.mozilla.org/security/advisories/mfsa2024-01/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-02
reference_id mfsa2024-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-02
18
reference_url https://www.mozilla.org/security/advisories/mfsa2024-02/
reference_id mfsa2024-02
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/
url https://www.mozilla.org/security/advisories/mfsa2024-02/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-04
reference_id mfsa2024-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-04
20
reference_url https://www.mozilla.org/security/advisories/mfsa2024-04/
reference_id mfsa2024-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/
url https://www.mozilla.org/security/advisories/mfsa2024-04/
21
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html
22
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html
23
reference_url https://access.redhat.com/errata/RHSA-2024:0559
reference_id RHSA-2024:0559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0559
24
reference_url https://access.redhat.com/errata/RHSA-2024:0565
reference_id RHSA-2024:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0565
25
reference_url https://access.redhat.com/errata/RHSA-2024:0596
reference_id RHSA-2024:0596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0596
26
reference_url https://access.redhat.com/errata/RHSA-2024:0598
reference_id RHSA-2024:0598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0598
27
reference_url https://access.redhat.com/errata/RHSA-2024:0600
reference_id RHSA-2024:0600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0600
28
reference_url https://access.redhat.com/errata/RHSA-2024:0601
reference_id RHSA-2024:0601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0601
29
reference_url https://access.redhat.com/errata/RHSA-2024:0602
reference_id RHSA-2024:0602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0602
30
reference_url https://access.redhat.com/errata/RHSA-2024:0603
reference_id RHSA-2024:0603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0603
31
reference_url https://access.redhat.com/errata/RHSA-2024:0604
reference_id RHSA-2024:0604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0604
32
reference_url https://access.redhat.com/errata/RHSA-2024:0605
reference_id RHSA-2024:0605
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0605
33
reference_url https://access.redhat.com/errata/RHSA-2024:0608
reference_id RHSA-2024:0608
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0608
34
reference_url https://access.redhat.com/errata/RHSA-2024:0609
reference_id RHSA-2024:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0609
35
reference_url https://access.redhat.com/errata/RHSA-2024:0615
reference_id RHSA-2024:0615
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0615
36
reference_url https://access.redhat.com/errata/RHSA-2024:0616
reference_id RHSA-2024:0616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0616
37
reference_url https://access.redhat.com/errata/RHSA-2024:0618
reference_id RHSA-2024:0618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0618
38
reference_url https://access.redhat.com/errata/RHSA-2024:0619
reference_id RHSA-2024:0619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0619
39
reference_url https://access.redhat.com/errata/RHSA-2024:0622
reference_id RHSA-2024:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0622
40
reference_url https://access.redhat.com/errata/RHSA-2024:0623
reference_id RHSA-2024:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0623
41
reference_url https://usn.ubuntu.com/6610-1/
reference_id USN-6610-1
reference_type
scores
url https://usn.ubuntu.com/6610-1/
42
reference_url https://usn.ubuntu.com/6669-1/
reference_id USN-6669-1
reference_type
scores
url https://usn.ubuntu.com/6669-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2024-0755
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-apes-5sa9-w7gd
21
url VCID-bapg-hzuc-ykby
vulnerability_id VCID-bapg-hzuc-ykby
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4575.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4575.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4575
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33472
published_at 2026-04-21T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40787
published_at 2026-04-09T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40771
published_at 2026-04-12T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40804
published_at 2026-04-04T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40729
published_at 2026-04-07T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40779
published_at 2026-04-08T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.40805
published_at 2026-04-11T12:55:00Z
7
value 0.00189
scoring_system epss
scoring_elements 0.40777
published_at 2026-04-02T12:55:00Z
8
value 0.00189
scoring_system epss
scoring_elements 0.40765
published_at 2026-04-18T12:55:00Z
9
value 0.00189
scoring_system epss
scoring_elements 0.40796
published_at 2026-04-16T12:55:00Z
10
value 0.00189
scoring_system epss
scoring_elements 0.40752
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4575
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236073
reference_id 2236073
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236073
8
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
reference_id mfsa2023-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
10
reference_url https://www.mozilla.org/security/advisories/mfsa2023-34/
reference_id mfsa2023-34
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:05:40Z/
url https://www.mozilla.org/security/advisories/mfsa2023-34/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-35
reference_id mfsa2023-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-35
12
reference_url https://www.mozilla.org/security/advisories/mfsa2023-35/
reference_id mfsa2023-35
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:05:40Z/
url https://www.mozilla.org/security/advisories/mfsa2023-35/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
reference_id mfsa2023-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-36/
reference_id mfsa2023-36
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:05:40Z/
url https://www.mozilla.org/security/advisories/mfsa2023-36/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-37
reference_id mfsa2023-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-37
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-37/
reference_id mfsa2023-37
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:05:40Z/
url https://www.mozilla.org/security/advisories/mfsa2023-37/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
reference_id mfsa2023-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
18
reference_url https://www.mozilla.org/security/advisories/mfsa2023-38/
reference_id mfsa2023-38
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:05:40Z/
url https://www.mozilla.org/security/advisories/mfsa2023-38/
19
reference_url https://access.redhat.com/errata/RHSA-2023:4945
reference_id RHSA-2023:4945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4945
20
reference_url https://access.redhat.com/errata/RHSA-2023:4946
reference_id RHSA-2023:4946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4946
21
reference_url https://access.redhat.com/errata/RHSA-2023:4947
reference_id RHSA-2023:4947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4947
22
reference_url https://access.redhat.com/errata/RHSA-2023:4948
reference_id RHSA-2023:4948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4948
23
reference_url https://access.redhat.com/errata/RHSA-2023:4949
reference_id RHSA-2023:4949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4949
24
reference_url https://access.redhat.com/errata/RHSA-2023:4950
reference_id RHSA-2023:4950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4950
25
reference_url https://access.redhat.com/errata/RHSA-2023:4951
reference_id RHSA-2023:4951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4951
26
reference_url https://access.redhat.com/errata/RHSA-2023:4952
reference_id RHSA-2023:4952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4952
27
reference_url https://access.redhat.com/errata/RHSA-2023:4954
reference_id RHSA-2023:4954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4954
28
reference_url https://access.redhat.com/errata/RHSA-2023:4955
reference_id RHSA-2023:4955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4955
29
reference_url https://access.redhat.com/errata/RHSA-2023:4956
reference_id RHSA-2023:4956
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4956
30
reference_url https://access.redhat.com/errata/RHSA-2023:4957
reference_id RHSA-2023:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4957
31
reference_url https://access.redhat.com/errata/RHSA-2023:4958
reference_id RHSA-2023:4958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4958
32
reference_url https://access.redhat.com/errata/RHSA-2023:4959
reference_id RHSA-2023:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4959
33
reference_url https://access.redhat.com/errata/RHSA-2023:5019
reference_id RHSA-2023:5019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5019
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1846689
reference_id show_bug.cgi?id=1846689
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:05:40Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1846689
35
reference_url https://usn.ubuntu.com/6320-1/
reference_id USN-6320-1
reference_type
scores
url https://usn.ubuntu.com/6320-1/
36
reference_url https://usn.ubuntu.com/6368-1/
reference_id USN-6368-1
reference_type
scores
url https://usn.ubuntu.com/6368-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4575
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bapg-hzuc-ykby
22
url VCID-bw96-5g6y-j3c4
vulnerability_id VCID-bw96-5g6y-j3c4
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6860.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6860.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6860
reference_id
reference_type
scores
0
value 0.00449
scoring_system epss
scoring_elements 0.63638
published_at 2026-04-21T12:55:00Z
1
value 0.00471
scoring_system epss
scoring_elements 0.64619
published_at 2026-04-08T12:55:00Z
2
value 0.00471
scoring_system epss
scoring_elements 0.64612
published_at 2026-04-13T12:55:00Z
3
value 0.00471
scoring_system epss
scoring_elements 0.64648
published_at 2026-04-16T12:55:00Z
4
value 0.00471
scoring_system epss
scoring_elements 0.64659
published_at 2026-04-18T12:55:00Z
5
value 0.00471
scoring_system epss
scoring_elements 0.64584
published_at 2026-04-02T12:55:00Z
6
value 0.00471
scoring_system epss
scoring_elements 0.64613
published_at 2026-04-04T12:55:00Z
7
value 0.00471
scoring_system epss
scoring_elements 0.64571
published_at 2026-04-07T12:55:00Z
8
value 0.00471
scoring_system epss
scoring_elements 0.64636
published_at 2026-04-09T12:55:00Z
9
value 0.00471
scoring_system epss
scoring_elements 0.64653
published_at 2026-04-11T12:55:00Z
10
value 0.00471
scoring_system epss
scoring_elements 0.6464
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6860
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255365
reference_id 2255365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255365
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-6860
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bw96-5g6y-j3c4
23
url VCID-cfqv-7r6b-g3e9
vulnerability_id VCID-cfqv-7r6b-g3e9
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4576.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4576.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4576
reference_id
reference_type
scores
0
value 0.00325
scoring_system epss
scoring_elements 0.55549
published_at 2026-04-09T12:55:00Z
1
value 0.00325
scoring_system epss
scoring_elements 0.55561
published_at 2026-04-18T12:55:00Z
2
value 0.00325
scoring_system epss
scoring_elements 0.55558
published_at 2026-04-16T12:55:00Z
3
value 0.00325
scoring_system epss
scoring_elements 0.55538
published_at 2026-04-12T12:55:00Z
4
value 0.00325
scoring_system epss
scoring_elements 0.55559
published_at 2026-04-11T12:55:00Z
5
value 0.00325
scoring_system epss
scoring_elements 0.55521
published_at 2026-04-13T12:55:00Z
6
value 0.00325
scoring_system epss
scoring_elements 0.55497
published_at 2026-04-07T12:55:00Z
7
value 0.00325
scoring_system epss
scoring_elements 0.55539
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4576
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236074
reference_id 2236074
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236074
3
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
reference_id mfsa2023-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
5
reference_url https://www.mozilla.org/security/advisories/mfsa2023-34/
reference_id mfsa2023-34
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/
url https://www.mozilla.org/security/advisories/mfsa2023-34/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-35
reference_id mfsa2023-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-35
7
reference_url https://www.mozilla.org/security/advisories/mfsa2023-35/
reference_id mfsa2023-35
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/
url https://www.mozilla.org/security/advisories/mfsa2023-35/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
reference_id mfsa2023-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
9
reference_url https://www.mozilla.org/security/advisories/mfsa2023-36/
reference_id mfsa2023-36
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/
url https://www.mozilla.org/security/advisories/mfsa2023-36/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-37
reference_id mfsa2023-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-37
11
reference_url https://www.mozilla.org/security/advisories/mfsa2023-37/
reference_id mfsa2023-37
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/
url https://www.mozilla.org/security/advisories/mfsa2023-37/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
reference_id mfsa2023-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
13
reference_url https://www.mozilla.org/security/advisories/mfsa2023-38/
reference_id mfsa2023-38
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/
url https://www.mozilla.org/security/advisories/mfsa2023-38/
14
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1846694
reference_id show_bug.cgi?id=1846694
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1846694
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4576
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cfqv-7r6b-g3e9
24
url VCID-ch3v-nq5w-3fg4
vulnerability_id VCID-ch3v-nq5w-3fg4
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37202.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37202.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-37202
reference_id
reference_type
scores
0
value 0.00611
scoring_system epss
scoring_elements 0.69805
published_at 2026-04-21T12:55:00Z
1
value 0.00663
scoring_system epss
scoring_elements 0.71136
published_at 2026-04-02T12:55:00Z
2
value 0.00663
scoring_system epss
scoring_elements 0.7117
published_at 2026-04-08T12:55:00Z
3
value 0.00663
scoring_system epss
scoring_elements 0.71228
published_at 2026-04-18T12:55:00Z
4
value 0.00663
scoring_system epss
scoring_elements 0.71206
published_at 2026-04-11T12:55:00Z
5
value 0.00663
scoring_system epss
scoring_elements 0.71153
published_at 2026-04-04T12:55:00Z
6
value 0.00663
scoring_system epss
scoring_elements 0.71128
published_at 2026-04-07T12:55:00Z
7
value 0.00663
scoring_system epss
scoring_elements 0.71183
published_at 2026-04-09T12:55:00Z
8
value 0.00663
scoring_system epss
scoring_elements 0.71221
published_at 2026-04-16T12:55:00Z
9
value 0.00663
scoring_system epss
scoring_elements 0.71176
published_at 2026-04-13T12:55:00Z
10
value 0.00663
scoring_system epss
scoring_elements 0.71192
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-37202
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2219748
reference_id 2219748
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2219748
8
reference_url https://www.debian.org/security/2023/dsa-5450
reference_id dsa-5450
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/
url https://www.debian.org/security/2023/dsa-5450
9
reference_url https://www.debian.org/security/2023/dsa-5451
reference_id dsa-5451
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/
url https://www.debian.org/security/2023/dsa-5451
10
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
reference_id mfsa2023-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
12
reference_url https://www.mozilla.org/security/advisories/mfsa2023-22/
reference_id mfsa2023-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/
url https://www.mozilla.org/security/advisories/mfsa2023-22/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-23
reference_id mfsa2023-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-23
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-23/
reference_id mfsa2023-23
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/
url https://www.mozilla.org/security/advisories/mfsa2023-23/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-24
reference_id mfsa2023-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-24
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-24/
reference_id mfsa2023-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/
url https://www.mozilla.org/security/advisories/mfsa2023-24/
17
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html
18
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html
19
reference_url https://access.redhat.com/errata/RHSA-2023:4062
reference_id RHSA-2023:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4062
20
reference_url https://access.redhat.com/errata/RHSA-2023:4063
reference_id RHSA-2023:4063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4063
21
reference_url https://access.redhat.com/errata/RHSA-2023:4064
reference_id RHSA-2023:4064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4064
22
reference_url https://access.redhat.com/errata/RHSA-2023:4065
reference_id RHSA-2023:4065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4065
23
reference_url https://access.redhat.com/errata/RHSA-2023:4066
reference_id RHSA-2023:4066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4066
24
reference_url https://access.redhat.com/errata/RHSA-2023:4067
reference_id RHSA-2023:4067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4067
25
reference_url https://access.redhat.com/errata/RHSA-2023:4068
reference_id RHSA-2023:4068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4068
26
reference_url https://access.redhat.com/errata/RHSA-2023:4069
reference_id RHSA-2023:4069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4069
27
reference_url https://access.redhat.com/errata/RHSA-2023:4070
reference_id RHSA-2023:4070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4070
28
reference_url https://access.redhat.com/errata/RHSA-2023:4071
reference_id RHSA-2023:4071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4071
29
reference_url https://access.redhat.com/errata/RHSA-2023:4072
reference_id RHSA-2023:4072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4072
30
reference_url https://access.redhat.com/errata/RHSA-2023:4073
reference_id RHSA-2023:4073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4073
31
reference_url https://access.redhat.com/errata/RHSA-2023:4074
reference_id RHSA-2023:4074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4074
32
reference_url https://access.redhat.com/errata/RHSA-2023:4075
reference_id RHSA-2023:4075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4075
33
reference_url https://access.redhat.com/errata/RHSA-2023:4076
reference_id RHSA-2023:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4076
34
reference_url https://access.redhat.com/errata/RHSA-2023:4079
reference_id RHSA-2023:4079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4079
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1834711
reference_id show_bug.cgi?id=1834711
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1834711
36
reference_url https://usn.ubuntu.com/6201-1/
reference_id USN-6201-1
reference_type
scores
url https://usn.ubuntu.com/6201-1/
37
reference_url https://usn.ubuntu.com/6214-1/
reference_id USN-6214-1
reference_type
scores
url https://usn.ubuntu.com/6214-1/
38
reference_url https://usn.ubuntu.com/6227-1/
reference_id USN-6227-1
reference_type
scores
url https://usn.ubuntu.com/6227-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-37202
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ch3v-nq5w-3fg4
25
url VCID-cj16-a2tv-cqd7
vulnerability_id VCID-cj16-a2tv-cqd7
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4574.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4574.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4574
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33472
published_at 2026-04-21T12:55:00Z
1
value 0.00145
scoring_system epss
scoring_elements 0.34839
published_at 2026-04-09T12:55:00Z
2
value 0.00145
scoring_system epss
scoring_elements 0.34806
published_at 2026-04-12T12:55:00Z
3
value 0.00145
scoring_system epss
scoring_elements 0.34888
published_at 2026-04-04T12:55:00Z
4
value 0.00145
scoring_system epss
scoring_elements 0.34766
published_at 2026-04-07T12:55:00Z
5
value 0.00145
scoring_system epss
scoring_elements 0.3481
published_at 2026-04-08T12:55:00Z
6
value 0.00145
scoring_system epss
scoring_elements 0.34844
published_at 2026-04-11T12:55:00Z
7
value 0.00145
scoring_system epss
scoring_elements 0.34861
published_at 2026-04-02T12:55:00Z
8
value 0.00145
scoring_system epss
scoring_elements 0.34803
published_at 2026-04-18T12:55:00Z
9
value 0.00145
scoring_system epss
scoring_elements 0.34819
published_at 2026-04-16T12:55:00Z
10
value 0.00145
scoring_system epss
scoring_elements 0.34782
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4574
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236072
reference_id 2236072
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236072
8
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
reference_id mfsa2023-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
10
reference_url https://www.mozilla.org/security/advisories/mfsa2023-34/
reference_id mfsa2023-34
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:07:09Z/
url https://www.mozilla.org/security/advisories/mfsa2023-34/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-35
reference_id mfsa2023-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-35
12
reference_url https://www.mozilla.org/security/advisories/mfsa2023-35/
reference_id mfsa2023-35
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:07:09Z/
url https://www.mozilla.org/security/advisories/mfsa2023-35/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
reference_id mfsa2023-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-36/
reference_id mfsa2023-36
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:07:09Z/
url https://www.mozilla.org/security/advisories/mfsa2023-36/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-37
reference_id mfsa2023-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-37
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-37/
reference_id mfsa2023-37
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:07:09Z/
url https://www.mozilla.org/security/advisories/mfsa2023-37/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
reference_id mfsa2023-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
18
reference_url https://www.mozilla.org/security/advisories/mfsa2023-38/
reference_id mfsa2023-38
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:07:09Z/
url https://www.mozilla.org/security/advisories/mfsa2023-38/
19
reference_url https://access.redhat.com/errata/RHSA-2023:4945
reference_id RHSA-2023:4945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4945
20
reference_url https://access.redhat.com/errata/RHSA-2023:4946
reference_id RHSA-2023:4946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4946
21
reference_url https://access.redhat.com/errata/RHSA-2023:4947
reference_id RHSA-2023:4947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4947
22
reference_url https://access.redhat.com/errata/RHSA-2023:4948
reference_id RHSA-2023:4948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4948
23
reference_url https://access.redhat.com/errata/RHSA-2023:4949
reference_id RHSA-2023:4949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4949
24
reference_url https://access.redhat.com/errata/RHSA-2023:4950
reference_id RHSA-2023:4950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4950
25
reference_url https://access.redhat.com/errata/RHSA-2023:4951
reference_id RHSA-2023:4951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4951
26
reference_url https://access.redhat.com/errata/RHSA-2023:4952
reference_id RHSA-2023:4952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4952
27
reference_url https://access.redhat.com/errata/RHSA-2023:4954
reference_id RHSA-2023:4954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4954
28
reference_url https://access.redhat.com/errata/RHSA-2023:4955
reference_id RHSA-2023:4955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4955
29
reference_url https://access.redhat.com/errata/RHSA-2023:4956
reference_id RHSA-2023:4956
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4956
30
reference_url https://access.redhat.com/errata/RHSA-2023:4957
reference_id RHSA-2023:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4957
31
reference_url https://access.redhat.com/errata/RHSA-2023:4958
reference_id RHSA-2023:4958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4958
32
reference_url https://access.redhat.com/errata/RHSA-2023:4959
reference_id RHSA-2023:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4959
33
reference_url https://access.redhat.com/errata/RHSA-2023:5019
reference_id RHSA-2023:5019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5019
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1846688
reference_id show_bug.cgi?id=1846688
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:07:09Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1846688
35
reference_url https://usn.ubuntu.com/6320-1/
reference_id USN-6320-1
reference_type
scores
url https://usn.ubuntu.com/6320-1/
36
reference_url https://usn.ubuntu.com/6368-1/
reference_id USN-6368-1
reference_type
scores
url https://usn.ubuntu.com/6368-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4574
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cj16-a2tv-cqd7
26
url VCID-e6bs-vk6j-h3e6
vulnerability_id VCID-e6bs-vk6j-h3e6
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6206.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6206.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6206
reference_id
reference_type
scores
0
value 0.00428
scoring_system epss
scoring_elements 0.62485
published_at 2026-04-18T12:55:00Z
1
value 0.00428
scoring_system epss
scoring_elements 0.62458
published_at 2026-04-12T12:55:00Z
2
value 0.00428
scoring_system epss
scoring_elements 0.62435
published_at 2026-04-13T12:55:00Z
3
value 0.00428
scoring_system epss
scoring_elements 0.62479
published_at 2026-04-16T12:55:00Z
4
value 0.00428
scoring_system epss
scoring_elements 0.62387
published_at 2026-04-02T12:55:00Z
5
value 0.00428
scoring_system epss
scoring_elements 0.62418
published_at 2026-04-04T12:55:00Z
6
value 0.00428
scoring_system epss
scoring_elements 0.62384
published_at 2026-04-07T12:55:00Z
7
value 0.00428
scoring_system epss
scoring_elements 0.62432
published_at 2026-04-08T12:55:00Z
8
value 0.00428
scoring_system epss
scoring_elements 0.62449
published_at 2026-04-09T12:55:00Z
9
value 0.00428
scoring_system epss
scoring_elements 0.62468
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6206
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2250898
reference_id 2250898
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2250898
10
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
reference_id mfsa2023-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-50
reference_id mfsa2023-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-50
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-52
reference_id mfsa2023-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-52
14
reference_url https://access.redhat.com/errata/RHSA-2023:7499
reference_id RHSA-2023:7499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7499
15
reference_url https://access.redhat.com/errata/RHSA-2023:7500
reference_id RHSA-2023:7500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7500
16
reference_url https://access.redhat.com/errata/RHSA-2023:7501
reference_id RHSA-2023:7501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7501
17
reference_url https://access.redhat.com/errata/RHSA-2023:7502
reference_id RHSA-2023:7502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7502
18
reference_url https://access.redhat.com/errata/RHSA-2023:7503
reference_id RHSA-2023:7503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7503
19
reference_url https://access.redhat.com/errata/RHSA-2023:7504
reference_id RHSA-2023:7504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7504
20
reference_url https://access.redhat.com/errata/RHSA-2023:7505
reference_id RHSA-2023:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7505
21
reference_url https://access.redhat.com/errata/RHSA-2023:7506
reference_id RHSA-2023:7506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7506
22
reference_url https://access.redhat.com/errata/RHSA-2023:7507
reference_id RHSA-2023:7507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7507
23
reference_url https://access.redhat.com/errata/RHSA-2023:7508
reference_id RHSA-2023:7508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7508
24
reference_url https://access.redhat.com/errata/RHSA-2023:7509
reference_id RHSA-2023:7509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7509
25
reference_url https://access.redhat.com/errata/RHSA-2023:7510
reference_id RHSA-2023:7510
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7510
26
reference_url https://access.redhat.com/errata/RHSA-2023:7511
reference_id RHSA-2023:7511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7511
27
reference_url https://access.redhat.com/errata/RHSA-2023:7512
reference_id RHSA-2023:7512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7512
28
reference_url https://access.redhat.com/errata/RHSA-2023:7547
reference_id RHSA-2023:7547
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7547
29
reference_url https://access.redhat.com/errata/RHSA-2023:7569
reference_id RHSA-2023:7569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7569
30
reference_url https://access.redhat.com/errata/RHSA-2023:7570
reference_id RHSA-2023:7570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7570
31
reference_url https://access.redhat.com/errata/RHSA-2023:7573
reference_id RHSA-2023:7573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7573
32
reference_url https://access.redhat.com/errata/RHSA-2023:7574
reference_id RHSA-2023:7574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7574
33
reference_url https://access.redhat.com/errata/RHSA-2023:7577
reference_id RHSA-2023:7577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7577
34
reference_url https://usn.ubuntu.com/6509-1/
reference_id USN-6509-1
reference_type
scores
url https://usn.ubuntu.com/6509-1/
35
reference_url https://usn.ubuntu.com/6515-1/
reference_id USN-6515-1
reference_type
scores
url https://usn.ubuntu.com/6515-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-6206
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e6bs-vk6j-h3e6
27
url VCID-f6qv-znt2-2bd5
vulnerability_id VCID-f6qv-znt2-2bd5
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6863.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6863.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6863
reference_id
reference_type
scores
0
value 0.00464
scoring_system epss
scoring_elements 0.6437
published_at 2026-04-21T12:55:00Z
1
value 0.00504
scoring_system epss
scoring_elements 0.66189
published_at 2026-04-08T12:55:00Z
2
value 0.00504
scoring_system epss
scoring_elements 0.66178
published_at 2026-04-13T12:55:00Z
3
value 0.00504
scoring_system epss
scoring_elements 0.66214
published_at 2026-04-16T12:55:00Z
4
value 0.00504
scoring_system epss
scoring_elements 0.66228
published_at 2026-04-18T12:55:00Z
5
value 0.00504
scoring_system epss
scoring_elements 0.66146
published_at 2026-04-02T12:55:00Z
6
value 0.00504
scoring_system epss
scoring_elements 0.66173
published_at 2026-04-04T12:55:00Z
7
value 0.00504
scoring_system epss
scoring_elements 0.66141
published_at 2026-04-07T12:55:00Z
8
value 0.00504
scoring_system epss
scoring_elements 0.66203
published_at 2026-04-09T12:55:00Z
9
value 0.00504
scoring_system epss
scoring_elements 0.66222
published_at 2026-04-11T12:55:00Z
10
value 0.00504
scoring_system epss
scoring_elements 0.66209
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6863
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255369
reference_id 2255369
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255369
14
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
18
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
19
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
20
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
21
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
22
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
23
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
24
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
25
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
26
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
27
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
28
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
29
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
30
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
31
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
32
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
33
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
34
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
35
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
36
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
37
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-6863
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f6qv-znt2-2bd5
28
url VCID-fwr3-cgq1-a3b4
vulnerability_id VCID-fwr3-cgq1-a3b4
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6204.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6204.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6204
reference_id
reference_type
scores
0
value 0.00266
scoring_system epss
scoring_elements 0.50096
published_at 2026-04-18T12:55:00Z
1
value 0.00266
scoring_system epss
scoring_elements 0.50054
published_at 2026-04-12T12:55:00Z
2
value 0.00266
scoring_system epss
scoring_elements 0.5005
published_at 2026-04-13T12:55:00Z
3
value 0.00266
scoring_system epss
scoring_elements 0.50095
published_at 2026-04-16T12:55:00Z
4
value 0.00266
scoring_system epss
scoring_elements 0.50038
published_at 2026-04-02T12:55:00Z
5
value 0.00266
scoring_system epss
scoring_elements 0.50067
published_at 2026-04-21T12:55:00Z
6
value 0.00266
scoring_system epss
scoring_elements 0.50016
published_at 2026-04-07T12:55:00Z
7
value 0.00266
scoring_system epss
scoring_elements 0.50071
published_at 2026-04-08T12:55:00Z
8
value 0.00266
scoring_system epss
scoring_elements 0.50064
published_at 2026-04-09T12:55:00Z
9
value 0.00266
scoring_system epss
scoring_elements 0.50082
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6204
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2250896
reference_id 2250896
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2250896
10
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
reference_id mfsa2023-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-50
reference_id mfsa2023-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-50
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-52
reference_id mfsa2023-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-52
14
reference_url https://access.redhat.com/errata/RHSA-2023:7499
reference_id RHSA-2023:7499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7499
15
reference_url https://access.redhat.com/errata/RHSA-2023:7500
reference_id RHSA-2023:7500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7500
16
reference_url https://access.redhat.com/errata/RHSA-2023:7501
reference_id RHSA-2023:7501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7501
17
reference_url https://access.redhat.com/errata/RHSA-2023:7502
reference_id RHSA-2023:7502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7502
18
reference_url https://access.redhat.com/errata/RHSA-2023:7503
reference_id RHSA-2023:7503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7503
19
reference_url https://access.redhat.com/errata/RHSA-2023:7504
reference_id RHSA-2023:7504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7504
20
reference_url https://access.redhat.com/errata/RHSA-2023:7505
reference_id RHSA-2023:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7505
21
reference_url https://access.redhat.com/errata/RHSA-2023:7506
reference_id RHSA-2023:7506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7506
22
reference_url https://access.redhat.com/errata/RHSA-2023:7507
reference_id RHSA-2023:7507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7507
23
reference_url https://access.redhat.com/errata/RHSA-2023:7508
reference_id RHSA-2023:7508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7508
24
reference_url https://access.redhat.com/errata/RHSA-2023:7509
reference_id RHSA-2023:7509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7509
25
reference_url https://access.redhat.com/errata/RHSA-2023:7510
reference_id RHSA-2023:7510
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7510
26
reference_url https://access.redhat.com/errata/RHSA-2023:7511
reference_id RHSA-2023:7511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7511
27
reference_url https://access.redhat.com/errata/RHSA-2023:7512
reference_id RHSA-2023:7512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7512
28
reference_url https://access.redhat.com/errata/RHSA-2023:7547
reference_id RHSA-2023:7547
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7547
29
reference_url https://access.redhat.com/errata/RHSA-2023:7569
reference_id RHSA-2023:7569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7569
30
reference_url https://access.redhat.com/errata/RHSA-2023:7570
reference_id RHSA-2023:7570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7570
31
reference_url https://access.redhat.com/errata/RHSA-2023:7573
reference_id RHSA-2023:7573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7573
32
reference_url https://access.redhat.com/errata/RHSA-2023:7574
reference_id RHSA-2023:7574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7574
33
reference_url https://access.redhat.com/errata/RHSA-2023:7577
reference_id RHSA-2023:7577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7577
34
reference_url https://usn.ubuntu.com/6509-1/
reference_id USN-6509-1
reference_type
scores
url https://usn.ubuntu.com/6509-1/
35
reference_url https://usn.ubuntu.com/6515-1/
reference_id USN-6515-1
reference_type
scores
url https://usn.ubuntu.com/6515-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-6204
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fwr3-cgq1-a3b4
29
url VCID-g5z1-9an3-aubs
vulnerability_id VCID-g5z1-9an3-aubs
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5732.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5732.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5732
reference_id
reference_type
scores
0
value 0.00289
scoring_system epss
scoring_elements 0.52414
published_at 2026-04-21T12:55:00Z
1
value 0.00319
scoring_system epss
scoring_elements 0.54974
published_at 2026-04-04T12:55:00Z
2
value 0.00319
scoring_system epss
scoring_elements 0.55001
published_at 2026-04-16T12:55:00Z
3
value 0.00319
scoring_system epss
scoring_elements 0.54992
published_at 2026-04-09T12:55:00Z
4
value 0.00319
scoring_system epss
scoring_elements 0.54993
published_at 2026-04-08T12:55:00Z
5
value 0.00319
scoring_system epss
scoring_elements 0.54943
published_at 2026-04-07T12:55:00Z
6
value 0.00319
scoring_system epss
scoring_elements 0.54948
published_at 2026-04-02T12:55:00Z
7
value 0.00319
scoring_system epss
scoring_elements 0.54963
published_at 2026-04-13T12:55:00Z
8
value 0.00319
scoring_system epss
scoring_elements 0.54986
published_at 2026-04-12T12:55:00Z
9
value 0.00319
scoring_system epss
scoring_elements 0.55004
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5732
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245898
reference_id 2245898
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245898
10
reference_url https://www.debian.org/security/2023/dsa-5535
reference_id dsa-5535
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/
url https://www.debian.org/security/2023/dsa-5535
11
reference_url https://www.debian.org/security/2023/dsa-5538
reference_id dsa-5538
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/
url https://www.debian.org/security/2023/dsa-5538
12
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
reference_id mfsa2023-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-34/
reference_id mfsa2023-34
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/
url https://www.mozilla.org/security/advisories/mfsa2023-34/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-46
reference_id mfsa2023-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-46
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-46/
reference_id mfsa2023-46
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/
url https://www.mozilla.org/security/advisories/mfsa2023-46/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-47
reference_id mfsa2023-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-47
18
reference_url https://www.mozilla.org/security/advisories/mfsa2023-47/
reference_id mfsa2023-47
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/
url https://www.mozilla.org/security/advisories/mfsa2023-47/
19
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html
reference_id msg00037.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html
20
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html
reference_id msg00042.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html
21
reference_url https://access.redhat.com/errata/RHSA-2023:6162
reference_id RHSA-2023:6162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6162
22
reference_url https://access.redhat.com/errata/RHSA-2023:6185
reference_id RHSA-2023:6185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6185
23
reference_url https://access.redhat.com/errata/RHSA-2023:6186
reference_id RHSA-2023:6186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6186
24
reference_url https://access.redhat.com/errata/RHSA-2023:6187
reference_id RHSA-2023:6187
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6187
25
reference_url https://access.redhat.com/errata/RHSA-2023:6188
reference_id RHSA-2023:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6188
26
reference_url https://access.redhat.com/errata/RHSA-2023:6189
reference_id RHSA-2023:6189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6189
27
reference_url https://access.redhat.com/errata/RHSA-2023:6191
reference_id RHSA-2023:6191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6191
28
reference_url https://access.redhat.com/errata/RHSA-2023:6194
reference_id RHSA-2023:6194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6194
29
reference_url https://access.redhat.com/errata/RHSA-2023:6195
reference_id RHSA-2023:6195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6195
30
reference_url https://access.redhat.com/errata/RHSA-2023:6196
reference_id RHSA-2023:6196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6196
31
reference_url https://access.redhat.com/errata/RHSA-2023:6197
reference_id RHSA-2023:6197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6197
32
reference_url https://access.redhat.com/errata/RHSA-2023:6198
reference_id RHSA-2023:6198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6198
33
reference_url https://access.redhat.com/errata/RHSA-2023:6199
reference_id RHSA-2023:6199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6199
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1690979
reference_id show_bug.cgi?id=1690979
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1690979
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1836962
reference_id show_bug.cgi?id=1836962
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1836962
36
reference_url https://usn.ubuntu.com/6468-1/
reference_id USN-6468-1
reference_type
scores
url https://usn.ubuntu.com/6468-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-5732
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g5z1-9an3-aubs
30
url VCID-gs3s-s4zk-fyh4
vulnerability_id VCID-gs3s-s4zk-fyh4
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37201.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37201.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-37201
reference_id
reference_type
scores
0
value 0.00711
scoring_system epss
scoring_elements 0.72279
published_at 2026-04-21T12:55:00Z
1
value 0.00755
scoring_system epss
scoring_elements 0.73196
published_at 2026-04-02T12:55:00Z
2
value 0.00755
scoring_system epss
scoring_elements 0.73227
published_at 2026-04-08T12:55:00Z
3
value 0.00755
scoring_system epss
scoring_elements 0.73291
published_at 2026-04-18T12:55:00Z
4
value 0.00755
scoring_system epss
scoring_elements 0.73266
published_at 2026-04-11T12:55:00Z
5
value 0.00755
scoring_system epss
scoring_elements 0.73217
published_at 2026-04-04T12:55:00Z
6
value 0.00755
scoring_system epss
scoring_elements 0.73191
published_at 2026-04-07T12:55:00Z
7
value 0.00755
scoring_system epss
scoring_elements 0.73241
published_at 2026-04-09T12:55:00Z
8
value 0.00755
scoring_system epss
scoring_elements 0.73282
published_at 2026-04-16T12:55:00Z
9
value 0.00755
scoring_system epss
scoring_elements 0.73239
published_at 2026-04-13T12:55:00Z
10
value 0.00755
scoring_system epss
scoring_elements 0.73246
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-37201
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2219747
reference_id 2219747
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2219747
8
reference_url https://www.debian.org/security/2023/dsa-5450
reference_id dsa-5450
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/
url https://www.debian.org/security/2023/dsa-5450
9
reference_url https://www.debian.org/security/2023/dsa-5451
reference_id dsa-5451
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/
url https://www.debian.org/security/2023/dsa-5451
10
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
reference_id mfsa2023-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
12
reference_url https://www.mozilla.org/security/advisories/mfsa2023-22/
reference_id mfsa2023-22
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/
url https://www.mozilla.org/security/advisories/mfsa2023-22/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-23
reference_id mfsa2023-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-23
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-23/
reference_id mfsa2023-23
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/
url https://www.mozilla.org/security/advisories/mfsa2023-23/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-24
reference_id mfsa2023-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-24
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-24/
reference_id mfsa2023-24
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/
url https://www.mozilla.org/security/advisories/mfsa2023-24/
17
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html
18
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html
19
reference_url https://access.redhat.com/errata/RHSA-2023:4062
reference_id RHSA-2023:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4062
20
reference_url https://access.redhat.com/errata/RHSA-2023:4063
reference_id RHSA-2023:4063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4063
21
reference_url https://access.redhat.com/errata/RHSA-2023:4064
reference_id RHSA-2023:4064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4064
22
reference_url https://access.redhat.com/errata/RHSA-2023:4065
reference_id RHSA-2023:4065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4065
23
reference_url https://access.redhat.com/errata/RHSA-2023:4066
reference_id RHSA-2023:4066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4066
24
reference_url https://access.redhat.com/errata/RHSA-2023:4067
reference_id RHSA-2023:4067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4067
25
reference_url https://access.redhat.com/errata/RHSA-2023:4068
reference_id RHSA-2023:4068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4068
26
reference_url https://access.redhat.com/errata/RHSA-2023:4069
reference_id RHSA-2023:4069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4069
27
reference_url https://access.redhat.com/errata/RHSA-2023:4070
reference_id RHSA-2023:4070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4070
28
reference_url https://access.redhat.com/errata/RHSA-2023:4071
reference_id RHSA-2023:4071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4071
29
reference_url https://access.redhat.com/errata/RHSA-2023:4072
reference_id RHSA-2023:4072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4072
30
reference_url https://access.redhat.com/errata/RHSA-2023:4073
reference_id RHSA-2023:4073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4073
31
reference_url https://access.redhat.com/errata/RHSA-2023:4074
reference_id RHSA-2023:4074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4074
32
reference_url https://access.redhat.com/errata/RHSA-2023:4075
reference_id RHSA-2023:4075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4075
33
reference_url https://access.redhat.com/errata/RHSA-2023:4076
reference_id RHSA-2023:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4076
34
reference_url https://access.redhat.com/errata/RHSA-2023:4079
reference_id RHSA-2023:4079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4079
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1826002
reference_id show_bug.cgi?id=1826002
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1826002
36
reference_url https://usn.ubuntu.com/6201-1/
reference_id USN-6201-1
reference_type
scores
url https://usn.ubuntu.com/6201-1/
37
reference_url https://usn.ubuntu.com/6214-1/
reference_id USN-6214-1
reference_type
scores
url https://usn.ubuntu.com/6214-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-37201
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gs3s-s4zk-fyh4
31
url VCID-j1yh-f1np-wbcv
vulnerability_id VCID-j1yh-f1np-wbcv
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4584.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4584.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4584
reference_id
reference_type
scores
0
value 0.00275
scoring_system epss
scoring_elements 0.5101
published_at 2026-04-18T12:55:00Z
1
value 0.00275
scoring_system epss
scoring_elements 0.51004
published_at 2026-04-16T12:55:00Z
2
value 0.00275
scoring_system epss
scoring_elements 0.50966
published_at 2026-04-13T12:55:00Z
3
value 0.00275
scoring_system epss
scoring_elements 0.50982
published_at 2026-04-12T12:55:00Z
4
value 0.00275
scoring_system epss
scoring_elements 0.50923
published_at 2026-04-02T12:55:00Z
5
value 0.00275
scoring_system epss
scoring_elements 0.50949
published_at 2026-04-04T12:55:00Z
6
value 0.00275
scoring_system epss
scoring_elements 0.50907
published_at 2026-04-07T12:55:00Z
7
value 0.00275
scoring_system epss
scoring_elements 0.50964
published_at 2026-04-08T12:55:00Z
8
value 0.00275
scoring_system epss
scoring_elements 0.51003
published_at 2026-04-11T12:55:00Z
9
value 0.00275
scoring_system epss
scoring_elements 0.50961
published_at 2026-04-09T12:55:00Z
10
value 0.00292
scoring_system epss
scoring_elements 0.52618
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4584
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236084
reference_id 2236084
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236084
8
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
reference_id mfsa2023-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-35
reference_id mfsa2023-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-35
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
reference_id mfsa2023-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-37
reference_id mfsa2023-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-37
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
reference_id mfsa2023-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
14
reference_url https://access.redhat.com/errata/RHSA-2023:4945
reference_id RHSA-2023:4945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4945
15
reference_url https://access.redhat.com/errata/RHSA-2023:4946
reference_id RHSA-2023:4946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4946
16
reference_url https://access.redhat.com/errata/RHSA-2023:4947
reference_id RHSA-2023:4947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4947
17
reference_url https://access.redhat.com/errata/RHSA-2023:4948
reference_id RHSA-2023:4948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4948
18
reference_url https://access.redhat.com/errata/RHSA-2023:4949
reference_id RHSA-2023:4949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4949
19
reference_url https://access.redhat.com/errata/RHSA-2023:4950
reference_id RHSA-2023:4950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4950
20
reference_url https://access.redhat.com/errata/RHSA-2023:4951
reference_id RHSA-2023:4951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4951
21
reference_url https://access.redhat.com/errata/RHSA-2023:4952
reference_id RHSA-2023:4952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4952
22
reference_url https://access.redhat.com/errata/RHSA-2023:4954
reference_id RHSA-2023:4954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4954
23
reference_url https://access.redhat.com/errata/RHSA-2023:4955
reference_id RHSA-2023:4955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4955
24
reference_url https://access.redhat.com/errata/RHSA-2023:4956
reference_id RHSA-2023:4956
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4956
25
reference_url https://access.redhat.com/errata/RHSA-2023:4957
reference_id RHSA-2023:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4957
26
reference_url https://access.redhat.com/errata/RHSA-2023:4958
reference_id RHSA-2023:4958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4958
27
reference_url https://access.redhat.com/errata/RHSA-2023:4959
reference_id RHSA-2023:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4959
28
reference_url https://access.redhat.com/errata/RHSA-2023:5019
reference_id RHSA-2023:5019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5019
29
reference_url https://usn.ubuntu.com/6320-1/
reference_id USN-6320-1
reference_type
scores
url https://usn.ubuntu.com/6320-1/
30
reference_url https://usn.ubuntu.com/6368-1/
reference_id USN-6368-1
reference_type
scores
url https://usn.ubuntu.com/6368-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4584
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j1yh-f1np-wbcv
32
url VCID-j2ax-jb2h-byeu
vulnerability_id VCID-j2ax-jb2h-byeu
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4052.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4052.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4052
reference_id
reference_type
scores
0
value 0.00179
scoring_system epss
scoring_elements 0.39393
published_at 2026-04-21T12:55:00Z
1
value 0.00179
scoring_system epss
scoring_elements 0.39484
published_at 2026-04-08T12:55:00Z
2
value 0.00179
scoring_system epss
scoring_elements 0.395
published_at 2026-04-09T12:55:00Z
3
value 0.00179
scoring_system epss
scoring_elements 0.3951
published_at 2026-04-11T12:55:00Z
4
value 0.00179
scoring_system epss
scoring_elements 0.39472
published_at 2026-04-12T12:55:00Z
5
value 0.00179
scoring_system epss
scoring_elements 0.39455
published_at 2026-04-13T12:55:00Z
6
value 0.00179
scoring_system epss
scoring_elements 0.39506
published_at 2026-04-16T12:55:00Z
7
value 0.00179
scoring_system epss
scoring_elements 0.39478
published_at 2026-04-18T12:55:00Z
8
value 0.00179
scoring_system epss
scoring_elements 0.39491
published_at 2026-04-02T12:55:00Z
9
value 0.00179
scoring_system epss
scoring_elements 0.39515
published_at 2026-04-04T12:55:00Z
10
value 0.00179
scoring_system epss
scoring_elements 0.39429
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4052
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228369
reference_id 2228369
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2228369
3
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
5
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:38:55Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
reference_id mfsa2023-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
7
reference_url https://www.mozilla.org/security/advisories/mfsa2023-31/
reference_id mfsa2023-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:38:55Z/
url https://www.mozilla.org/security/advisories/mfsa2023-31/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
reference_id mfsa2023-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
9
reference_url https://www.mozilla.org/security/advisories/mfsa2023-33/
reference_id mfsa2023-33
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:38:55Z/
url https://www.mozilla.org/security/advisories/mfsa2023-33/
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1824420
reference_id show_bug.cgi?id=1824420
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:38:55Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1824420
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4052
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j2ax-jb2h-byeu
33
url VCID-j45f-m9q5-vfah
vulnerability_id VCID-j45f-m9q5-vfah
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50762.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50762.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-50762
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.40137
published_at 2026-04-08T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.40163
published_at 2026-04-04T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.40085
published_at 2026-04-07T12:55:00Z
3
value 0.00184
scoring_system epss
scoring_elements 0.4015
published_at 2026-04-09T12:55:00Z
4
value 0.00184
scoring_system epss
scoring_elements 0.40161
published_at 2026-04-11T12:55:00Z
5
value 0.00184
scoring_system epss
scoring_elements 0.40123
published_at 2026-04-12T12:55:00Z
6
value 0.00184
scoring_system epss
scoring_elements 0.40104
published_at 2026-04-13T12:55:00Z
7
value 0.00184
scoring_system epss
scoring_elements 0.40124
published_at 2026-04-18T12:55:00Z
8
value 0.00184
scoring_system epss
scoring_elements 0.40154
published_at 2026-04-16T12:55:00Z
9
value 0.00288
scoring_system epss
scoring_elements 0.52318
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-50762
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255379
reference_id 2255379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255379
14
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
16
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
17
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
18
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
19
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
20
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
21
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
22
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
23
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
24
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
25
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-50762
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j45f-m9q5-vfah
34
url VCID-jzte-jqk6-7ya6
vulnerability_id VCID-jzte-jqk6-7ya6
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5169.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5169.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5169
reference_id
reference_type
scores
0
value 0.0024
scoring_system epss
scoring_elements 0.47125
published_at 2026-04-18T12:55:00Z
1
value 0.0024
scoring_system epss
scoring_elements 0.47129
published_at 2026-04-16T12:55:00Z
2
value 0.0024
scoring_system epss
scoring_elements 0.4705
published_at 2026-04-02T12:55:00Z
3
value 0.0024
scoring_system epss
scoring_elements 0.47016
published_at 2026-04-07T12:55:00Z
4
value 0.0024
scoring_system epss
scoring_elements 0.47066
published_at 2026-04-12T12:55:00Z
5
value 0.0024
scoring_system epss
scoring_elements 0.47092
published_at 2026-04-11T12:55:00Z
6
value 0.0024
scoring_system epss
scoring_elements 0.47068
published_at 2026-04-09T12:55:00Z
7
value 0.0024
scoring_system epss
scoring_elements 0.47069
published_at 2026-04-04T12:55:00Z
8
value 0.0024
scoring_system epss
scoring_elements 0.47071
published_at 2026-04-08T12:55:00Z
9
value 0.0024
scoring_system epss
scoring_elements 0.47073
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5169
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2240893
reference_id 2240893
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2240893
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/
reference_id AY642Z6JZODQJE7Z62CFREVUHEGCXGPD
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/
8
reference_url https://www.debian.org/security/2023/dsa-5506
reference_id dsa-5506
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/
url https://www.debian.org/security/2023/dsa-5506
9
reference_url https://www.debian.org/security/2023/dsa-5513
reference_id dsa-5513
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/
url https://www.debian.org/security/2023/dsa-5513
10
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
reference_id mfsa2023-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
12
reference_url https://www.mozilla.org/security/advisories/mfsa2023-41/
reference_id mfsa2023-41
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/
url https://www.mozilla.org/security/advisories/mfsa2023-41/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-42
reference_id mfsa2023-42
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-42
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-42/
reference_id mfsa2023-42
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/
url https://www.mozilla.org/security/advisories/mfsa2023-42/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-43
reference_id mfsa2023-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-43
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-43/
reference_id mfsa2023-43
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/
url https://www.mozilla.org/security/advisories/mfsa2023-43/
17
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html
18
reference_url https://access.redhat.com/errata/RHSA-2023:5426
reference_id RHSA-2023:5426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5426
19
reference_url https://access.redhat.com/errata/RHSA-2023:5427
reference_id RHSA-2023:5427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5427
20
reference_url https://access.redhat.com/errata/RHSA-2023:5428
reference_id RHSA-2023:5428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5428
21
reference_url https://access.redhat.com/errata/RHSA-2023:5429
reference_id RHSA-2023:5429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5429
22
reference_url https://access.redhat.com/errata/RHSA-2023:5430
reference_id RHSA-2023:5430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5430
23
reference_url https://access.redhat.com/errata/RHSA-2023:5432
reference_id RHSA-2023:5432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5432
24
reference_url https://access.redhat.com/errata/RHSA-2023:5433
reference_id RHSA-2023:5433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5433
25
reference_url https://access.redhat.com/errata/RHSA-2023:5434
reference_id RHSA-2023:5434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5434
26
reference_url https://access.redhat.com/errata/RHSA-2023:5435
reference_id RHSA-2023:5435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5435
27
reference_url https://access.redhat.com/errata/RHSA-2023:5436
reference_id RHSA-2023:5436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5436
28
reference_url https://access.redhat.com/errata/RHSA-2023:5437
reference_id RHSA-2023:5437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5437
29
reference_url https://access.redhat.com/errata/RHSA-2023:5438
reference_id RHSA-2023:5438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5438
30
reference_url https://access.redhat.com/errata/RHSA-2023:5439
reference_id RHSA-2023:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5439
31
reference_url https://access.redhat.com/errata/RHSA-2023:5440
reference_id RHSA-2023:5440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5440
32
reference_url https://access.redhat.com/errata/RHSA-2023:5475
reference_id RHSA-2023:5475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5475
33
reference_url https://access.redhat.com/errata/RHSA-2023:5477
reference_id RHSA-2023:5477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5477
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1846685
reference_id show_bug.cgi?id=1846685
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1846685
35
reference_url https://usn.ubuntu.com/6404-1/
reference_id USN-6404-1
reference_type
scores
url https://usn.ubuntu.com/6404-1/
36
reference_url https://usn.ubuntu.com/6405-1/
reference_id USN-6405-1
reference_type
scores
url https://usn.ubuntu.com/6405-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-5169
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jzte-jqk6-7ya6
35
url VCID-kskc-agaw-8bcr
vulnerability_id VCID-kskc-agaw-8bcr
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6857.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6857.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6857
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.40745
published_at 2026-04-18T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40775
published_at 2026-04-16T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40755
published_at 2026-04-02T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40783
published_at 2026-04-11T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40707
published_at 2026-04-07T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40757
published_at 2026-04-08T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.40764
published_at 2026-04-09T12:55:00Z
7
value 0.00189
scoring_system epss
scoring_elements 0.4073
published_at 2026-04-13T12:55:00Z
8
value 0.00189
scoring_system epss
scoring_elements 0.40749
published_at 2026-04-12T12:55:00Z
9
value 0.00227
scoring_system epss
scoring_elements 0.45504
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6857
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255362
reference_id 2255362
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255362
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-6857
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kskc-agaw-8bcr
36
url VCID-m2sr-re2h-3baq
vulnerability_id VCID-m2sr-re2h-3baq
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4050.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4050.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4050
reference_id
reference_type
scores
0
value 0.03401
scoring_system epss
scoring_elements 0.87432
published_at 2026-04-21T12:55:00Z
1
value 0.04614
scoring_system epss
scoring_elements 0.8926
published_at 2026-04-13T12:55:00Z
2
value 0.04614
scoring_system epss
scoring_elements 0.89263
published_at 2026-04-12T12:55:00Z
3
value 0.04614
scoring_system epss
scoring_elements 0.89218
published_at 2026-04-02T12:55:00Z
4
value 0.04614
scoring_system epss
scoring_elements 0.89233
published_at 2026-04-04T12:55:00Z
5
value 0.04614
scoring_system epss
scoring_elements 0.89267
published_at 2026-04-11T12:55:00Z
6
value 0.04614
scoring_system epss
scoring_elements 0.89257
published_at 2026-04-09T12:55:00Z
7
value 0.04614
scoring_system epss
scoring_elements 0.89235
published_at 2026-04-07T12:55:00Z
8
value 0.04614
scoring_system epss
scoring_elements 0.89253
published_at 2026-04-08T12:55:00Z
9
value 0.04614
scoring_system epss
scoring_elements 0.89273
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4050
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228365
reference_id 2228365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2228365
11
reference_url https://www.debian.org/security/2023/dsa-5464
reference_id dsa-5464
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/
url https://www.debian.org/security/2023/dsa-5464
12
reference_url https://www.debian.org/security/2023/dsa-5469
reference_id dsa-5469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/
url https://www.debian.org/security/2023/dsa-5469
13
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
15
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
reference_id mfsa2023-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
17
reference_url https://www.mozilla.org/security/advisories/mfsa2023-30/
reference_id mfsa2023-30
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/
url https://www.mozilla.org/security/advisories/mfsa2023-30/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
reference_id mfsa2023-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
19
reference_url https://www.mozilla.org/security/advisories/mfsa2023-31/
reference_id mfsa2023-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/
url https://www.mozilla.org/security/advisories/mfsa2023-31/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
reference_id mfsa2023-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
reference_id mfsa2023-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
22
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
23
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
24
reference_url https://access.redhat.com/errata/RHSA-2023:4460
reference_id RHSA-2023:4460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4460
25
reference_url https://access.redhat.com/errata/RHSA-2023:4461
reference_id RHSA-2023:4461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4461
26
reference_url https://access.redhat.com/errata/RHSA-2023:4462
reference_id RHSA-2023:4462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4462
27
reference_url https://access.redhat.com/errata/RHSA-2023:4463
reference_id RHSA-2023:4463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4463
28
reference_url https://access.redhat.com/errata/RHSA-2023:4464
reference_id RHSA-2023:4464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4464
29
reference_url https://access.redhat.com/errata/RHSA-2023:4465
reference_id RHSA-2023:4465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4465
30
reference_url https://access.redhat.com/errata/RHSA-2023:4468
reference_id RHSA-2023:4468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4468
31
reference_url https://access.redhat.com/errata/RHSA-2023:4469
reference_id RHSA-2023:4469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4469
32
reference_url https://access.redhat.com/errata/RHSA-2023:4492
reference_id RHSA-2023:4492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4492
33
reference_url https://access.redhat.com/errata/RHSA-2023:4493
reference_id RHSA-2023:4493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4493
34
reference_url https://access.redhat.com/errata/RHSA-2023:4494
reference_id RHSA-2023:4494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4494
35
reference_url https://access.redhat.com/errata/RHSA-2023:4495
reference_id RHSA-2023:4495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4495
36
reference_url https://access.redhat.com/errata/RHSA-2023:4496
reference_id RHSA-2023:4496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4496
37
reference_url https://access.redhat.com/errata/RHSA-2023:4497
reference_id RHSA-2023:4497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4497
38
reference_url https://access.redhat.com/errata/RHSA-2023:4499
reference_id RHSA-2023:4499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4499
39
reference_url https://access.redhat.com/errata/RHSA-2023:4500
reference_id RHSA-2023:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4500
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1843038
reference_id show_bug.cgi?id=1843038
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1843038
41
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
42
reference_url https://usn.ubuntu.com/6333-1/
reference_id USN-6333-1
reference_type
scores
url https://usn.ubuntu.com/6333-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4050
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m2sr-re2h-3baq
37
url VCID-mh92-65bz-43ds
vulnerability_id VCID-mh92-65bz-43ds
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5721.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5721.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5721
reference_id
reference_type
scores
0
value 0.00309
scoring_system epss
scoring_elements 0.54094
published_at 2026-04-18T12:55:00Z
1
value 0.00309
scoring_system epss
scoring_elements 0.54012
published_at 2026-04-04T12:55:00Z
2
value 0.00309
scoring_system epss
scoring_elements 0.54086
published_at 2026-04-11T12:55:00Z
3
value 0.00309
scoring_system epss
scoring_elements 0.54039
published_at 2026-04-09T12:55:00Z
4
value 0.00309
scoring_system epss
scoring_elements 0.53988
published_at 2026-04-07T12:55:00Z
5
value 0.00309
scoring_system epss
scoring_elements 0.53985
published_at 2026-04-02T12:55:00Z
6
value 0.00309
scoring_system epss
scoring_elements 0.54089
published_at 2026-04-16T12:55:00Z
7
value 0.00309
scoring_system epss
scoring_elements 0.5405
published_at 2026-04-13T12:55:00Z
8
value 0.00309
scoring_system epss
scoring_elements 0.54068
published_at 2026-04-12T12:55:00Z
9
value 0.00332
scoring_system epss
scoring_elements 0.56086
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5721
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245896
reference_id 2245896
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245896
10
reference_url https://www.debian.org/security/2023/dsa-5535
reference_id dsa-5535
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/
url https://www.debian.org/security/2023/dsa-5535
11
reference_url https://www.debian.org/security/2023/dsa-5538
reference_id dsa-5538
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/
url https://www.debian.org/security/2023/dsa-5538
12
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-45
reference_id mfsa2023-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-45
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-45/
reference_id mfsa2023-45
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/
url https://www.mozilla.org/security/advisories/mfsa2023-45/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-46
reference_id mfsa2023-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-46
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-46/
reference_id mfsa2023-46
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/
url https://www.mozilla.org/security/advisories/mfsa2023-46/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-47
reference_id mfsa2023-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-47
18
reference_url https://www.mozilla.org/security/advisories/mfsa2023-47/
reference_id mfsa2023-47
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/
url https://www.mozilla.org/security/advisories/mfsa2023-47/
19
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html
reference_id msg00037.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html
20
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html
reference_id msg00042.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html
21
reference_url https://access.redhat.com/errata/RHSA-2023:6162
reference_id RHSA-2023:6162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6162
22
reference_url https://access.redhat.com/errata/RHSA-2023:6185
reference_id RHSA-2023:6185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6185
23
reference_url https://access.redhat.com/errata/RHSA-2023:6186
reference_id RHSA-2023:6186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6186
24
reference_url https://access.redhat.com/errata/RHSA-2023:6187
reference_id RHSA-2023:6187
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6187
25
reference_url https://access.redhat.com/errata/RHSA-2023:6188
reference_id RHSA-2023:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6188
26
reference_url https://access.redhat.com/errata/RHSA-2023:6189
reference_id RHSA-2023:6189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6189
27
reference_url https://access.redhat.com/errata/RHSA-2023:6191
reference_id RHSA-2023:6191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6191
28
reference_url https://access.redhat.com/errata/RHSA-2023:6194
reference_id RHSA-2023:6194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6194
29
reference_url https://access.redhat.com/errata/RHSA-2023:6195
reference_id RHSA-2023:6195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6195
30
reference_url https://access.redhat.com/errata/RHSA-2023:6196
reference_id RHSA-2023:6196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6196
31
reference_url https://access.redhat.com/errata/RHSA-2023:6197
reference_id RHSA-2023:6197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6197
32
reference_url https://access.redhat.com/errata/RHSA-2023:6198
reference_id RHSA-2023:6198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6198
33
reference_url https://access.redhat.com/errata/RHSA-2023:6199
reference_id RHSA-2023:6199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6199
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1830820
reference_id show_bug.cgi?id=1830820
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1830820
35
reference_url https://usn.ubuntu.com/6456-1/
reference_id USN-6456-1
reference_type
scores
url https://usn.ubuntu.com/6456-1/
36
reference_url https://usn.ubuntu.com/6468-1/
reference_id USN-6468-1
reference_type
scores
url https://usn.ubuntu.com/6468-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-5721
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mh92-65bz-43ds
38
url VCID-mj7n-8hf6-2qar
vulnerability_id VCID-mj7n-8hf6-2qar
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5724.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5724.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5724
reference_id
reference_type
scores
0
value 0.00605
scoring_system epss
scoring_elements 0.69645
published_at 2026-04-21T12:55:00Z
1
value 0.00831
scoring_system epss
scoring_elements 0.74508
published_at 2026-04-07T12:55:00Z
2
value 0.00831
scoring_system epss
scoring_elements 0.74596
published_at 2026-04-18T12:55:00Z
3
value 0.00831
scoring_system epss
scoring_elements 0.74507
published_at 2026-04-02T12:55:00Z
4
value 0.00831
scoring_system epss
scoring_elements 0.74588
published_at 2026-04-16T12:55:00Z
5
value 0.00831
scoring_system epss
scoring_elements 0.74551
published_at 2026-04-13T12:55:00Z
6
value 0.00831
scoring_system epss
scoring_elements 0.74559
published_at 2026-04-12T12:55:00Z
7
value 0.00831
scoring_system epss
scoring_elements 0.74578
published_at 2026-04-11T12:55:00Z
8
value 0.00831
scoring_system epss
scoring_elements 0.74556
published_at 2026-04-09T12:55:00Z
9
value 0.00831
scoring_system epss
scoring_elements 0.7454
published_at 2026-04-08T12:55:00Z
10
value 0.00831
scoring_system epss
scoring_elements 0.74534
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5724
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245899
reference_id 2245899
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245899
10
reference_url https://www.debian.org/security/2023/dsa-5535
reference_id dsa-5535
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/
url https://www.debian.org/security/2023/dsa-5535
11
reference_url https://www.debian.org/security/2023/dsa-5538
reference_id dsa-5538
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/
url https://www.debian.org/security/2023/dsa-5538
12
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-45
reference_id mfsa2023-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-45
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-45/
reference_id mfsa2023-45
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/
url https://www.mozilla.org/security/advisories/mfsa2023-45/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-46
reference_id mfsa2023-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-46
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-46/
reference_id mfsa2023-46
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/
url https://www.mozilla.org/security/advisories/mfsa2023-46/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-47
reference_id mfsa2023-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-47
18
reference_url https://www.mozilla.org/security/advisories/mfsa2023-47/
reference_id mfsa2023-47
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/
url https://www.mozilla.org/security/advisories/mfsa2023-47/
19
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html
reference_id msg00037.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html
20
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html
reference_id msg00042.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html
21
reference_url https://access.redhat.com/errata/RHSA-2023:6162
reference_id RHSA-2023:6162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6162
22
reference_url https://access.redhat.com/errata/RHSA-2023:6185
reference_id RHSA-2023:6185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6185
23
reference_url https://access.redhat.com/errata/RHSA-2023:6186
reference_id RHSA-2023:6186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6186
24
reference_url https://access.redhat.com/errata/RHSA-2023:6187
reference_id RHSA-2023:6187
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6187
25
reference_url https://access.redhat.com/errata/RHSA-2023:6188
reference_id RHSA-2023:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6188
26
reference_url https://access.redhat.com/errata/RHSA-2023:6189
reference_id RHSA-2023:6189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6189
27
reference_url https://access.redhat.com/errata/RHSA-2023:6191
reference_id RHSA-2023:6191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6191
28
reference_url https://access.redhat.com/errata/RHSA-2023:6194
reference_id RHSA-2023:6194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6194
29
reference_url https://access.redhat.com/errata/RHSA-2023:6195
reference_id RHSA-2023:6195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6195
30
reference_url https://access.redhat.com/errata/RHSA-2023:6196
reference_id RHSA-2023:6196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6196
31
reference_url https://access.redhat.com/errata/RHSA-2023:6197
reference_id RHSA-2023:6197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6197
32
reference_url https://access.redhat.com/errata/RHSA-2023:6198
reference_id RHSA-2023:6198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6198
33
reference_url https://access.redhat.com/errata/RHSA-2023:6199
reference_id RHSA-2023:6199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6199
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1836705
reference_id show_bug.cgi?id=1836705
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1836705
35
reference_url https://usn.ubuntu.com/6456-1/
reference_id USN-6456-1
reference_type
scores
url https://usn.ubuntu.com/6456-1/
36
reference_url https://usn.ubuntu.com/6468-1/
reference_id USN-6468-1
reference_type
scores
url https://usn.ubuntu.com/6468-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-5724
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mj7n-8hf6-2qar
39
url VCID-mwj3-wa1g-buay
vulnerability_id VCID-mwj3-wa1g-buay
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37207.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37207.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-37207
reference_id
reference_type
scores
0
value 0.00414
scoring_system epss
scoring_elements 0.61568
published_at 2026-04-21T12:55:00Z
1
value 0.00502
scoring_system epss
scoring_elements 0.66011
published_at 2026-04-02T12:55:00Z
2
value 0.00502
scoring_system epss
scoring_elements 0.66056
published_at 2026-04-08T12:55:00Z
3
value 0.00502
scoring_system epss
scoring_elements 0.66093
published_at 2026-04-18T12:55:00Z
4
value 0.00502
scoring_system epss
scoring_elements 0.66087
published_at 2026-04-11T12:55:00Z
5
value 0.00502
scoring_system epss
scoring_elements 0.66039
published_at 2026-04-04T12:55:00Z
6
value 0.00502
scoring_system epss
scoring_elements 0.66007
published_at 2026-04-07T12:55:00Z
7
value 0.00502
scoring_system epss
scoring_elements 0.66068
published_at 2026-04-09T12:55:00Z
8
value 0.00502
scoring_system epss
scoring_elements 0.66078
published_at 2026-04-16T12:55:00Z
9
value 0.00502
scoring_system epss
scoring_elements 0.66043
published_at 2026-04-13T12:55:00Z
10
value 0.00502
scoring_system epss
scoring_elements 0.66074
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-37207
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2219749
reference_id 2219749
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2219749
8
reference_url https://www.debian.org/security/2023/dsa-5450
reference_id dsa-5450
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/
url https://www.debian.org/security/2023/dsa-5450
9
reference_url https://www.debian.org/security/2023/dsa-5451
reference_id dsa-5451
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/
url https://www.debian.org/security/2023/dsa-5451
10
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
reference_id mfsa2023-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
12
reference_url https://www.mozilla.org/security/advisories/mfsa2023-22/
reference_id mfsa2023-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/
url https://www.mozilla.org/security/advisories/mfsa2023-22/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-23
reference_id mfsa2023-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-23
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-23/
reference_id mfsa2023-23
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/
url https://www.mozilla.org/security/advisories/mfsa2023-23/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-24
reference_id mfsa2023-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-24
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-24/
reference_id mfsa2023-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/
url https://www.mozilla.org/security/advisories/mfsa2023-24/
17
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html
18
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html
19
reference_url https://access.redhat.com/errata/RHSA-2023:4062
reference_id RHSA-2023:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4062
20
reference_url https://access.redhat.com/errata/RHSA-2023:4063
reference_id RHSA-2023:4063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4063
21
reference_url https://access.redhat.com/errata/RHSA-2023:4064
reference_id RHSA-2023:4064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4064
22
reference_url https://access.redhat.com/errata/RHSA-2023:4065
reference_id RHSA-2023:4065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4065
23
reference_url https://access.redhat.com/errata/RHSA-2023:4066
reference_id RHSA-2023:4066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4066
24
reference_url https://access.redhat.com/errata/RHSA-2023:4067
reference_id RHSA-2023:4067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4067
25
reference_url https://access.redhat.com/errata/RHSA-2023:4068
reference_id RHSA-2023:4068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4068
26
reference_url https://access.redhat.com/errata/RHSA-2023:4069
reference_id RHSA-2023:4069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4069
27
reference_url https://access.redhat.com/errata/RHSA-2023:4070
reference_id RHSA-2023:4070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4070
28
reference_url https://access.redhat.com/errata/RHSA-2023:4071
reference_id RHSA-2023:4071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4071
29
reference_url https://access.redhat.com/errata/RHSA-2023:4072
reference_id RHSA-2023:4072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4072
30
reference_url https://access.redhat.com/errata/RHSA-2023:4073
reference_id RHSA-2023:4073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4073
31
reference_url https://access.redhat.com/errata/RHSA-2023:4074
reference_id RHSA-2023:4074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4074
32
reference_url https://access.redhat.com/errata/RHSA-2023:4075
reference_id RHSA-2023:4075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4075
33
reference_url https://access.redhat.com/errata/RHSA-2023:4076
reference_id RHSA-2023:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4076
34
reference_url https://access.redhat.com/errata/RHSA-2023:4079
reference_id RHSA-2023:4079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4079
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1816287
reference_id show_bug.cgi?id=1816287
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1816287
36
reference_url https://usn.ubuntu.com/6201-1/
reference_id USN-6201-1
reference_type
scores
url https://usn.ubuntu.com/6201-1/
37
reference_url https://usn.ubuntu.com/6214-1/
reference_id USN-6214-1
reference_type
scores
url https://usn.ubuntu.com/6214-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-37207
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mwj3-wa1g-buay
40
url VCID-nq6f-ezcx-mfas
vulnerability_id VCID-nq6f-ezcx-mfas
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50761.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50761.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-50761
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.40137
published_at 2026-04-08T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.40163
published_at 2026-04-04T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.40085
published_at 2026-04-07T12:55:00Z
3
value 0.00184
scoring_system epss
scoring_elements 0.4015
published_at 2026-04-09T12:55:00Z
4
value 0.00184
scoring_system epss
scoring_elements 0.40161
published_at 2026-04-11T12:55:00Z
5
value 0.00184
scoring_system epss
scoring_elements 0.40123
published_at 2026-04-12T12:55:00Z
6
value 0.00184
scoring_system epss
scoring_elements 0.40104
published_at 2026-04-13T12:55:00Z
7
value 0.00184
scoring_system epss
scoring_elements 0.40124
published_at 2026-04-18T12:55:00Z
8
value 0.00184
scoring_system epss
scoring_elements 0.40154
published_at 2026-04-16T12:55:00Z
9
value 0.00288
scoring_system epss
scoring_elements 0.52318
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-50761
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255378
reference_id 2255378
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255378
14
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
16
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
17
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
18
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
19
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
20
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
21
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
22
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
23
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
24
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
25
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-50761
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nq6f-ezcx-mfas
41
url VCID-pepm-1t68-uuf1
vulnerability_id VCID-pepm-1t68-uuf1
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6864.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6864.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6864
reference_id
reference_type
scores
0
value 0.00493
scoring_system epss
scoring_elements 0.65706
published_at 2026-04-21T12:55:00Z
1
value 0.0059
scoring_system epss
scoring_elements 0.69182
published_at 2026-04-08T12:55:00Z
2
value 0.0059
scoring_system epss
scoring_elements 0.6918
published_at 2026-04-13T12:55:00Z
3
value 0.0059
scoring_system epss
scoring_elements 0.69219
published_at 2026-04-16T12:55:00Z
4
value 0.0059
scoring_system epss
scoring_elements 0.69228
published_at 2026-04-18T12:55:00Z
5
value 0.0059
scoring_system epss
scoring_elements 0.6913
published_at 2026-04-02T12:55:00Z
6
value 0.0059
scoring_system epss
scoring_elements 0.69151
published_at 2026-04-04T12:55:00Z
7
value 0.0059
scoring_system epss
scoring_elements 0.69132
published_at 2026-04-07T12:55:00Z
8
value 0.0059
scoring_system epss
scoring_elements 0.69201
published_at 2026-04-09T12:55:00Z
9
value 0.0059
scoring_system epss
scoring_elements 0.69223
published_at 2026-04-11T12:55:00Z
10
value 0.0059
scoring_system epss
scoring_elements 0.69208
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6864
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255370
reference_id 2255370
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255370
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-6864
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pepm-1t68-uuf1
42
url VCID-pv9q-fcta-ffbq
vulnerability_id VCID-pv9q-fcta-ffbq
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4577.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4577.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4577
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.27915
published_at 2026-04-21T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.28025
published_at 2026-04-08T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.28067
published_at 2026-04-09T12:55:00Z
3
value 0.00102
scoring_system epss
scoring_elements 0.28073
published_at 2026-04-11T12:55:00Z
4
value 0.00102
scoring_system epss
scoring_elements 0.2803
published_at 2026-04-12T12:55:00Z
5
value 0.00102
scoring_system epss
scoring_elements 0.27973
published_at 2026-04-13T12:55:00Z
6
value 0.00102
scoring_system epss
scoring_elements 0.27981
published_at 2026-04-16T12:55:00Z
7
value 0.00102
scoring_system epss
scoring_elements 0.27963
published_at 2026-04-18T12:55:00Z
8
value 0.00102
scoring_system epss
scoring_elements 0.28118
published_at 2026-04-02T12:55:00Z
9
value 0.00102
scoring_system epss
scoring_elements 0.28161
published_at 2026-04-04T12:55:00Z
10
value 0.00102
scoring_system epss
scoring_elements 0.27958
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4577
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236075
reference_id 2236075
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236075
3
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
reference_id mfsa2023-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
5
reference_url https://www.mozilla.org/security/advisories/mfsa2023-34/
reference_id mfsa2023-34
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:33Z/
url https://www.mozilla.org/security/advisories/mfsa2023-34/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
reference_id mfsa2023-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
7
reference_url https://www.mozilla.org/security/advisories/mfsa2023-36/
reference_id mfsa2023-36
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:33Z/
url https://www.mozilla.org/security/advisories/mfsa2023-36/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
reference_id mfsa2023-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
9
reference_url https://www.mozilla.org/security/advisories/mfsa2023-38/
reference_id mfsa2023-38
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:33Z/
url https://www.mozilla.org/security/advisories/mfsa2023-38/
10
reference_url https://access.redhat.com/errata/RHSA-2023:4945
reference_id RHSA-2023:4945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4945
11
reference_url https://access.redhat.com/errata/RHSA-2023:4946
reference_id RHSA-2023:4946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4946
12
reference_url https://access.redhat.com/errata/RHSA-2023:4947
reference_id RHSA-2023:4947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4947
13
reference_url https://access.redhat.com/errata/RHSA-2023:4948
reference_id RHSA-2023:4948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4948
14
reference_url https://access.redhat.com/errata/RHSA-2023:4949
reference_id RHSA-2023:4949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4949
15
reference_url https://access.redhat.com/errata/RHSA-2023:4950
reference_id RHSA-2023:4950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4950
16
reference_url https://access.redhat.com/errata/RHSA-2023:4951
reference_id RHSA-2023:4951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4951
17
reference_url https://access.redhat.com/errata/RHSA-2023:4952
reference_id RHSA-2023:4952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4952
18
reference_url https://access.redhat.com/errata/RHSA-2023:4954
reference_id RHSA-2023:4954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4954
19
reference_url https://access.redhat.com/errata/RHSA-2023:4955
reference_id RHSA-2023:4955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4955
20
reference_url https://access.redhat.com/errata/RHSA-2023:4956
reference_id RHSA-2023:4956
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4956
21
reference_url https://access.redhat.com/errata/RHSA-2023:4957
reference_id RHSA-2023:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4957
22
reference_url https://access.redhat.com/errata/RHSA-2023:4958
reference_id RHSA-2023:4958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4958
23
reference_url https://access.redhat.com/errata/RHSA-2023:4959
reference_id RHSA-2023:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4959
24
reference_url https://access.redhat.com/errata/RHSA-2023:5019
reference_id RHSA-2023:5019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5019
25
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1847397
reference_id show_bug.cgi?id=1847397
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:33Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1847397
26
reference_url https://usn.ubuntu.com/6320-1/
reference_id USN-6320-1
reference_type
scores
url https://usn.ubuntu.com/6320-1/
27
reference_url https://usn.ubuntu.com/6405-1/
reference_id USN-6405-1
reference_type
scores
url https://usn.ubuntu.com/6405-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4577
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pv9q-fcta-ffbq
43
url VCID-pvvt-h3mh-33eb
vulnerability_id VCID-pvvt-h3mh-33eb
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0741.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0741.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0741
reference_id
reference_type
scores
0
value 0.47284
scoring_system epss
scoring_elements 0.97699
published_at 2026-04-21T12:55:00Z
1
value 0.49052
scoring_system epss
scoring_elements 0.97764
published_at 2026-04-08T12:55:00Z
2
value 0.49052
scoring_system epss
scoring_elements 0.97774
published_at 2026-04-13T12:55:00Z
3
value 0.49052
scoring_system epss
scoring_elements 0.97772
published_at 2026-04-12T12:55:00Z
4
value 0.49052
scoring_system epss
scoring_elements 0.9777
published_at 2026-04-11T12:55:00Z
5
value 0.49052
scoring_system epss
scoring_elements 0.97767
published_at 2026-04-09T12:55:00Z
6
value 0.49052
scoring_system epss
scoring_elements 0.97756
published_at 2026-04-02T12:55:00Z
7
value 0.49052
scoring_system epss
scoring_elements 0.97757
published_at 2026-04-04T12:55:00Z
8
value 0.49052
scoring_system epss
scoring_elements 0.97759
published_at 2026-04-07T12:55:00Z
9
value 0.49052
scoring_system epss
scoring_elements 0.97782
published_at 2026-04-18T12:55:00Z
10
value 0.49052
scoring_system epss
scoring_elements 0.9778
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0741
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2259926
reference_id 2259926
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2259926
12
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
13
reference_url https://security.gentoo.org/glsa/202402-26
reference_id GLSA-202402-26
reference_type
scores
url https://security.gentoo.org/glsa/202402-26
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
reference_id mfsa2024-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-01/
reference_id mfsa2024-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/
url https://www.mozilla.org/security/advisories/mfsa2024-01/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-02
reference_id mfsa2024-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-02
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-02/
reference_id mfsa2024-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/
url https://www.mozilla.org/security/advisories/mfsa2024-02/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-04
reference_id mfsa2024-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-04
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-04/
reference_id mfsa2024-04
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/
url https://www.mozilla.org/security/advisories/mfsa2024-04/
20
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html
21
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html
22
reference_url https://access.redhat.com/errata/RHSA-2024:0559
reference_id RHSA-2024:0559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0559
23
reference_url https://access.redhat.com/errata/RHSA-2024:0565
reference_id RHSA-2024:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0565
24
reference_url https://access.redhat.com/errata/RHSA-2024:0596
reference_id RHSA-2024:0596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0596
25
reference_url https://access.redhat.com/errata/RHSA-2024:0598
reference_id RHSA-2024:0598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0598
26
reference_url https://access.redhat.com/errata/RHSA-2024:0600
reference_id RHSA-2024:0600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0600
27
reference_url https://access.redhat.com/errata/RHSA-2024:0601
reference_id RHSA-2024:0601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0601
28
reference_url https://access.redhat.com/errata/RHSA-2024:0602
reference_id RHSA-2024:0602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0602
29
reference_url https://access.redhat.com/errata/RHSA-2024:0603
reference_id RHSA-2024:0603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0603
30
reference_url https://access.redhat.com/errata/RHSA-2024:0604
reference_id RHSA-2024:0604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0604
31
reference_url https://access.redhat.com/errata/RHSA-2024:0605
reference_id RHSA-2024:0605
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0605
32
reference_url https://access.redhat.com/errata/RHSA-2024:0608
reference_id RHSA-2024:0608
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0608
33
reference_url https://access.redhat.com/errata/RHSA-2024:0609
reference_id RHSA-2024:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0609
34
reference_url https://access.redhat.com/errata/RHSA-2024:0615
reference_id RHSA-2024:0615
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0615
35
reference_url https://access.redhat.com/errata/RHSA-2024:0616
reference_id RHSA-2024:0616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0616
36
reference_url https://access.redhat.com/errata/RHSA-2024:0618
reference_id RHSA-2024:0618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0618
37
reference_url https://access.redhat.com/errata/RHSA-2024:0619
reference_id RHSA-2024:0619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0619
38
reference_url https://access.redhat.com/errata/RHSA-2024:0622
reference_id RHSA-2024:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0622
39
reference_url https://access.redhat.com/errata/RHSA-2024:0623
reference_id RHSA-2024:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0623
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1864587
reference_id show_bug.cgi?id=1864587
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1864587
41
reference_url https://usn.ubuntu.com/6610-1/
reference_id USN-6610-1
reference_type
scores
url https://usn.ubuntu.com/6610-1/
42
reference_url https://usn.ubuntu.com/6669-1/
reference_id USN-6669-1
reference_type
scores
url https://usn.ubuntu.com/6669-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2024-0741
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pvvt-h3mh-33eb
44
url VCID-pybb-2ny2-quas
vulnerability_id VCID-pybb-2ny2-quas
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6209.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6209.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6209
reference_id
reference_type
scores
0
value 0.00378
scoring_system epss
scoring_elements 0.59352
published_at 2026-04-21T12:55:00Z
1
value 0.00378
scoring_system epss
scoring_elements 0.59332
published_at 2026-04-13T12:55:00Z
2
value 0.00378
scoring_system epss
scoring_elements 0.59365
published_at 2026-04-16T12:55:00Z
3
value 0.00378
scoring_system epss
scoring_elements 0.59371
published_at 2026-04-18T12:55:00Z
4
value 0.00378
scoring_system epss
scoring_elements 0.59296
published_at 2026-04-02T12:55:00Z
5
value 0.00378
scoring_system epss
scoring_elements 0.5932
published_at 2026-04-04T12:55:00Z
6
value 0.00378
scoring_system epss
scoring_elements 0.59284
published_at 2026-04-07T12:55:00Z
7
value 0.00378
scoring_system epss
scoring_elements 0.59335
published_at 2026-04-08T12:55:00Z
8
value 0.00378
scoring_system epss
scoring_elements 0.59348
published_at 2026-04-09T12:55:00Z
9
value 0.00378
scoring_system epss
scoring_elements 0.59367
published_at 2026-04-11T12:55:00Z
10
value 0.00378
scoring_system epss
scoring_elements 0.5935
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6209
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2250901
reference_id 2250901
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2250901
10
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
reference_id mfsa2023-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-50
reference_id mfsa2023-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-50
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-52
reference_id mfsa2023-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-52
14
reference_url https://access.redhat.com/errata/RHSA-2023:7499
reference_id RHSA-2023:7499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7499
15
reference_url https://access.redhat.com/errata/RHSA-2023:7500
reference_id RHSA-2023:7500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7500
16
reference_url https://access.redhat.com/errata/RHSA-2023:7501
reference_id RHSA-2023:7501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7501
17
reference_url https://access.redhat.com/errata/RHSA-2023:7502
reference_id RHSA-2023:7502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7502
18
reference_url https://access.redhat.com/errata/RHSA-2023:7503
reference_id RHSA-2023:7503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7503
19
reference_url https://access.redhat.com/errata/RHSA-2023:7504
reference_id RHSA-2023:7504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7504
20
reference_url https://access.redhat.com/errata/RHSA-2023:7505
reference_id RHSA-2023:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7505
21
reference_url https://access.redhat.com/errata/RHSA-2023:7506
reference_id RHSA-2023:7506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7506
22
reference_url https://access.redhat.com/errata/RHSA-2023:7507
reference_id RHSA-2023:7507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7507
23
reference_url https://access.redhat.com/errata/RHSA-2023:7508
reference_id RHSA-2023:7508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7508
24
reference_url https://access.redhat.com/errata/RHSA-2023:7509
reference_id RHSA-2023:7509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7509
25
reference_url https://access.redhat.com/errata/RHSA-2023:7510
reference_id RHSA-2023:7510
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7510
26
reference_url https://access.redhat.com/errata/RHSA-2023:7511
reference_id RHSA-2023:7511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7511
27
reference_url https://access.redhat.com/errata/RHSA-2023:7512
reference_id RHSA-2023:7512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7512
28
reference_url https://access.redhat.com/errata/RHSA-2023:7547
reference_id RHSA-2023:7547
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7547
29
reference_url https://access.redhat.com/errata/RHSA-2023:7569
reference_id RHSA-2023:7569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7569
30
reference_url https://access.redhat.com/errata/RHSA-2023:7570
reference_id RHSA-2023:7570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7570
31
reference_url https://access.redhat.com/errata/RHSA-2023:7573
reference_id RHSA-2023:7573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7573
32
reference_url https://access.redhat.com/errata/RHSA-2023:7574
reference_id RHSA-2023:7574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7574
33
reference_url https://access.redhat.com/errata/RHSA-2023:7577
reference_id RHSA-2023:7577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7577
34
reference_url https://usn.ubuntu.com/6509-1/
reference_id USN-6509-1
reference_type
scores
url https://usn.ubuntu.com/6509-1/
35
reference_url https://usn.ubuntu.com/6515-1/
reference_id USN-6515-1
reference_type
scores
url https://usn.ubuntu.com/6515-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-6209
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pybb-2ny2-quas
45
url VCID-qdqj-rhcr-wbca
vulnerability_id VCID-qdqj-rhcr-wbca
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6856.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6856.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6856
reference_id
reference_type
scores
0
value 0.10471
scoring_system epss
scoring_elements 0.93268
published_at 2026-04-21T12:55:00Z
1
value 0.10986
scoring_system epss
scoring_elements 0.93413
published_at 2026-04-08T12:55:00Z
2
value 0.10986
scoring_system epss
scoring_elements 0.93422
published_at 2026-04-13T12:55:00Z
3
value 0.10986
scoring_system epss
scoring_elements 0.93441
published_at 2026-04-16T12:55:00Z
4
value 0.10986
scoring_system epss
scoring_elements 0.93446
published_at 2026-04-18T12:55:00Z
5
value 0.10986
scoring_system epss
scoring_elements 0.93397
published_at 2026-04-02T12:55:00Z
6
value 0.10986
scoring_system epss
scoring_elements 0.93405
published_at 2026-04-07T12:55:00Z
7
value 0.10986
scoring_system epss
scoring_elements 0.93416
published_at 2026-04-09T12:55:00Z
8
value 0.10986
scoring_system epss
scoring_elements 0.93421
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6856
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255360
reference_id 2255360
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255360
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-6856
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qdqj-rhcr-wbca
46
url VCID-rbna-kkn2-2baj
vulnerability_id VCID-rbna-kkn2-2baj
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5176.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5176.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5176
reference_id
reference_type
scores
0
value 0.00704
scoring_system epss
scoring_elements 0.72119
published_at 2026-04-21T12:55:00Z
1
value 0.00704
scoring_system epss
scoring_elements 0.72134
published_at 2026-04-18T12:55:00Z
2
value 0.00704
scoring_system epss
scoring_elements 0.72047
published_at 2026-04-02T12:55:00Z
3
value 0.00704
scoring_system epss
scoring_elements 0.72126
published_at 2026-04-16T12:55:00Z
4
value 0.00704
scoring_system epss
scoring_elements 0.72085
published_at 2026-04-13T12:55:00Z
5
value 0.00704
scoring_system epss
scoring_elements 0.721
published_at 2026-04-12T12:55:00Z
6
value 0.00704
scoring_system epss
scoring_elements 0.72043
published_at 2026-04-07T12:55:00Z
7
value 0.00704
scoring_system epss
scoring_elements 0.7208
published_at 2026-04-08T12:55:00Z
8
value 0.00704
scoring_system epss
scoring_elements 0.72067
published_at 2026-04-04T12:55:00Z
9
value 0.00704
scoring_system epss
scoring_elements 0.72115
published_at 2026-04-11T12:55:00Z
10
value 0.00704
scoring_system epss
scoring_elements 0.72092
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5176
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2240896
reference_id 2240896
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2240896
7
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1836353%2C1842674%2C1843824%2C1843962%2C1848890%2C1850180%2C1850983%2C1851195
reference_id buglist.cgi?bug_id=1836353%2C1842674%2C1843824%2C1843962%2C1848890%2C1850180%2C1850983%2C1851195
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1836353%2C1842674%2C1843824%2C1843962%2C1848890%2C1850180%2C1850983%2C1851195
8
reference_url https://www.debian.org/security/2023/dsa-5506
reference_id dsa-5506
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://www.debian.org/security/2023/dsa-5506
9
reference_url https://www.debian.org/security/2023/dsa-5513
reference_id dsa-5513
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://www.debian.org/security/2023/dsa-5513
10
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
reference_id mfsa2023-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-41
12
reference_url https://www.mozilla.org/security/advisories/mfsa2023-41/
reference_id mfsa2023-41
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://www.mozilla.org/security/advisories/mfsa2023-41/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-42
reference_id mfsa2023-42
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-42
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-42/
reference_id mfsa2023-42
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://www.mozilla.org/security/advisories/mfsa2023-42/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-43
reference_id mfsa2023-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-43
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-43/
reference_id mfsa2023-43
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://www.mozilla.org/security/advisories/mfsa2023-43/
17
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html
18
reference_url https://access.redhat.com/errata/RHSA-2023:5426
reference_id RHSA-2023:5426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5426
19
reference_url https://access.redhat.com/errata/RHSA-2023:5427
reference_id RHSA-2023:5427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5427
20
reference_url https://access.redhat.com/errata/RHSA-2023:5428
reference_id RHSA-2023:5428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5428
21
reference_url https://access.redhat.com/errata/RHSA-2023:5429
reference_id RHSA-2023:5429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5429
22
reference_url https://access.redhat.com/errata/RHSA-2023:5430
reference_id RHSA-2023:5430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5430
23
reference_url https://access.redhat.com/errata/RHSA-2023:5432
reference_id RHSA-2023:5432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5432
24
reference_url https://access.redhat.com/errata/RHSA-2023:5433
reference_id RHSA-2023:5433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5433
25
reference_url https://access.redhat.com/errata/RHSA-2023:5434
reference_id RHSA-2023:5434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5434
26
reference_url https://access.redhat.com/errata/RHSA-2023:5435
reference_id RHSA-2023:5435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5435
27
reference_url https://access.redhat.com/errata/RHSA-2023:5436
reference_id RHSA-2023:5436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5436
28
reference_url https://access.redhat.com/errata/RHSA-2023:5437
reference_id RHSA-2023:5437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5437
29
reference_url https://access.redhat.com/errata/RHSA-2023:5438
reference_id RHSA-2023:5438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5438
30
reference_url https://access.redhat.com/errata/RHSA-2023:5439
reference_id RHSA-2023:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5439
31
reference_url https://access.redhat.com/errata/RHSA-2023:5440
reference_id RHSA-2023:5440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5440
32
reference_url https://access.redhat.com/errata/RHSA-2023:5475
reference_id RHSA-2023:5475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5475
33
reference_url https://access.redhat.com/errata/RHSA-2023:5477
reference_id RHSA-2023:5477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5477
34
reference_url https://usn.ubuntu.com/6404-1/
reference_id USN-6404-1
reference_type
scores
url https://usn.ubuntu.com/6404-1/
35
reference_url https://usn.ubuntu.com/6405-1/
reference_id USN-6405-1
reference_type
scores
url https://usn.ubuntu.com/6405-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-5176
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rbna-kkn2-2baj
47
url VCID-s3vw-7gyn-ubdt
vulnerability_id VCID-s3vw-7gyn-ubdt
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3600.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3600.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3600
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39362
published_at 2026-04-18T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39276
published_at 2026-04-21T12:55:00Z
2
value 0.00181
scoring_system epss
scoring_elements 0.39776
published_at 2026-04-07T12:55:00Z
3
value 0.00181
scoring_system epss
scoring_elements 0.39832
published_at 2026-04-02T12:55:00Z
4
value 0.00181
scoring_system epss
scoring_elements 0.39831
published_at 2026-04-08T12:55:00Z
5
value 0.00181
scoring_system epss
scoring_elements 0.39845
published_at 2026-04-09T12:55:00Z
6
value 0.00181
scoring_system epss
scoring_elements 0.39854
published_at 2026-04-11T12:55:00Z
7
value 0.00181
scoring_system epss
scoring_elements 0.39819
published_at 2026-04-12T12:55:00Z
8
value 0.00181
scoring_system epss
scoring_elements 0.39802
published_at 2026-04-13T12:55:00Z
9
value 0.00181
scoring_system epss
scoring_elements 0.39852
published_at 2026-04-16T12:55:00Z
10
value 0.00181
scoring_system epss
scoring_elements 0.39855
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3600
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2222652
reference_id 2222652
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2222652
4
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-26
reference_id mfsa2023-26
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-26
6
reference_url https://www.mozilla.org/security/advisories/mfsa2023-26/
reference_id mfsa2023-26
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-07T16:47:10Z/
url https://www.mozilla.org/security/advisories/mfsa2023-26/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-27
reference_id mfsa2023-27
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-27
8
reference_url https://www.mozilla.org/security/advisories/mfsa2023-27/
reference_id mfsa2023-27
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-07T16:47:10Z/
url https://www.mozilla.org/security/advisories/mfsa2023-27/
9
reference_url https://access.redhat.com/errata/RHSA-2023:5426
reference_id RHSA-2023:5426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5426
10
reference_url https://access.redhat.com/errata/RHSA-2023:5427
reference_id RHSA-2023:5427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5427
11
reference_url https://access.redhat.com/errata/RHSA-2023:5428
reference_id RHSA-2023:5428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5428
12
reference_url https://access.redhat.com/errata/RHSA-2023:5429
reference_id RHSA-2023:5429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5429
13
reference_url https://access.redhat.com/errata/RHSA-2023:5430
reference_id RHSA-2023:5430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5430
14
reference_url https://access.redhat.com/errata/RHSA-2023:5432
reference_id RHSA-2023:5432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5432
15
reference_url https://access.redhat.com/errata/RHSA-2023:5433
reference_id RHSA-2023:5433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5433
16
reference_url https://access.redhat.com/errata/RHSA-2023:5434
reference_id RHSA-2023:5434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5434
17
reference_url https://access.redhat.com/errata/RHSA-2023:5435
reference_id RHSA-2023:5435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5435
18
reference_url https://access.redhat.com/errata/RHSA-2023:5436
reference_id RHSA-2023:5436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5436
19
reference_url https://access.redhat.com/errata/RHSA-2023:5437
reference_id RHSA-2023:5437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5437
20
reference_url https://access.redhat.com/errata/RHSA-2023:5438
reference_id RHSA-2023:5438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5438
21
reference_url https://access.redhat.com/errata/RHSA-2023:5439
reference_id RHSA-2023:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5439
22
reference_url https://access.redhat.com/errata/RHSA-2023:5440
reference_id RHSA-2023:5440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5440
23
reference_url https://access.redhat.com/errata/RHSA-2023:5475
reference_id RHSA-2023:5475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5475
24
reference_url https://access.redhat.com/errata/RHSA-2023:5477
reference_id RHSA-2023:5477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5477
25
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1839703
reference_id show_bug.cgi?id=1839703
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-07T16:47:10Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1839703
26
reference_url https://usn.ubuntu.com/6218-1/
reference_id USN-6218-1
reference_type
scores
url https://usn.ubuntu.com/6218-1/
27
reference_url https://usn.ubuntu.com/6405-1/
reference_id USN-6405-1
reference_type
scores
url https://usn.ubuntu.com/6405-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-3600
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s3vw-7gyn-ubdt
48
url VCID-sfyj-m6xa-8bbc
vulnerability_id VCID-sfyj-m6xa-8bbc
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4581.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4581.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4581
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.36844
published_at 2026-04-21T12:55:00Z
1
value 0.00169
scoring_system epss
scoring_elements 0.38124
published_at 2026-04-09T12:55:00Z
2
value 0.00169
scoring_system epss
scoring_elements 0.38106
published_at 2026-04-12T12:55:00Z
3
value 0.00169
scoring_system epss
scoring_elements 0.38196
published_at 2026-04-04T12:55:00Z
4
value 0.00169
scoring_system epss
scoring_elements 0.38066
published_at 2026-04-07T12:55:00Z
5
value 0.00169
scoring_system epss
scoring_elements 0.38116
published_at 2026-04-08T12:55:00Z
6
value 0.00169
scoring_system epss
scoring_elements 0.38142
published_at 2026-04-11T12:55:00Z
7
value 0.00169
scoring_system epss
scoring_elements 0.38173
published_at 2026-04-02T12:55:00Z
8
value 0.00169
scoring_system epss
scoring_elements 0.38108
published_at 2026-04-18T12:55:00Z
9
value 0.00169
scoring_system epss
scoring_elements 0.38128
published_at 2026-04-16T12:55:00Z
10
value 0.00169
scoring_system epss
scoring_elements 0.38082
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4581
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236080
reference_id 2236080
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236080
8
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
reference_id mfsa2023-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
10
reference_url https://www.mozilla.org/security/advisories/mfsa2023-34/
reference_id mfsa2023-34
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:47Z/
url https://www.mozilla.org/security/advisories/mfsa2023-34/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-35
reference_id mfsa2023-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-35
12
reference_url https://www.mozilla.org/security/advisories/mfsa2023-35/
reference_id mfsa2023-35
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:47Z/
url https://www.mozilla.org/security/advisories/mfsa2023-35/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
reference_id mfsa2023-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-36/
reference_id mfsa2023-36
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:47Z/
url https://www.mozilla.org/security/advisories/mfsa2023-36/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-37
reference_id mfsa2023-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-37
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-37/
reference_id mfsa2023-37
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:47Z/
url https://www.mozilla.org/security/advisories/mfsa2023-37/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
reference_id mfsa2023-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
18
reference_url https://www.mozilla.org/security/advisories/mfsa2023-38/
reference_id mfsa2023-38
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:47Z/
url https://www.mozilla.org/security/advisories/mfsa2023-38/
19
reference_url https://access.redhat.com/errata/RHSA-2023:4945
reference_id RHSA-2023:4945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4945
20
reference_url https://access.redhat.com/errata/RHSA-2023:4946
reference_id RHSA-2023:4946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4946
21
reference_url https://access.redhat.com/errata/RHSA-2023:4947
reference_id RHSA-2023:4947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4947
22
reference_url https://access.redhat.com/errata/RHSA-2023:4948
reference_id RHSA-2023:4948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4948
23
reference_url https://access.redhat.com/errata/RHSA-2023:4949
reference_id RHSA-2023:4949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4949
24
reference_url https://access.redhat.com/errata/RHSA-2023:4950
reference_id RHSA-2023:4950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4950
25
reference_url https://access.redhat.com/errata/RHSA-2023:4951
reference_id RHSA-2023:4951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4951
26
reference_url https://access.redhat.com/errata/RHSA-2023:4952
reference_id RHSA-2023:4952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4952
27
reference_url https://access.redhat.com/errata/RHSA-2023:4954
reference_id RHSA-2023:4954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4954
28
reference_url https://access.redhat.com/errata/RHSA-2023:4955
reference_id RHSA-2023:4955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4955
29
reference_url https://access.redhat.com/errata/RHSA-2023:4956
reference_id RHSA-2023:4956
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4956
30
reference_url https://access.redhat.com/errata/RHSA-2023:4957
reference_id RHSA-2023:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4957
31
reference_url https://access.redhat.com/errata/RHSA-2023:4958
reference_id RHSA-2023:4958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4958
32
reference_url https://access.redhat.com/errata/RHSA-2023:4959
reference_id RHSA-2023:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4959
33
reference_url https://access.redhat.com/errata/RHSA-2023:5019
reference_id RHSA-2023:5019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5019
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1843758
reference_id show_bug.cgi?id=1843758
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:47Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1843758
35
reference_url https://usn.ubuntu.com/6320-1/
reference_id USN-6320-1
reference_type
scores
url https://usn.ubuntu.com/6320-1/
36
reference_url https://usn.ubuntu.com/6368-1/
reference_id USN-6368-1
reference_type
scores
url https://usn.ubuntu.com/6368-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4581
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sfyj-m6xa-8bbc
49
url VCID-sh7r-dftz-kyhn
vulnerability_id VCID-sh7r-dftz-kyhn
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4045.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4045.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4045
reference_id
reference_type
scores
0
value 0.00235
scoring_system epss
scoring_elements 0.46466
published_at 2026-04-21T12:55:00Z
1
value 0.00325
scoring_system epss
scoring_elements 0.55534
published_at 2026-04-16T12:55:00Z
2
value 0.00325
scoring_system epss
scoring_elements 0.55498
published_at 2026-04-13T12:55:00Z
3
value 0.00325
scoring_system epss
scoring_elements 0.55496
published_at 2026-04-04T12:55:00Z
4
value 0.00325
scoring_system epss
scoring_elements 0.55538
published_at 2026-04-18T12:55:00Z
5
value 0.00325
scoring_system epss
scoring_elements 0.55526
published_at 2026-04-09T12:55:00Z
6
value 0.00325
scoring_system epss
scoring_elements 0.55474
published_at 2026-04-07T12:55:00Z
7
value 0.00325
scoring_system epss
scoring_elements 0.55471
published_at 2026-04-02T12:55:00Z
8
value 0.00325
scoring_system epss
scoring_elements 0.55515
published_at 2026-04-12T12:55:00Z
9
value 0.00325
scoring_system epss
scoring_elements 0.55535
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4045
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228360
reference_id 2228360
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2228360
12
reference_url https://www.debian.org/security/2023/dsa-5464
reference_id dsa-5464
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/
url https://www.debian.org/security/2023/dsa-5464
13
reference_url https://www.debian.org/security/2023/dsa-5469
reference_id dsa-5469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/
url https://www.debian.org/security/2023/dsa-5469
14
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
reference_id mfsa2023-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
18
reference_url https://www.mozilla.org/security/advisories/mfsa2023-30/
reference_id mfsa2023-30
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/
url https://www.mozilla.org/security/advisories/mfsa2023-30/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
reference_id mfsa2023-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
20
reference_url https://www.mozilla.org/security/advisories/mfsa2023-31/
reference_id mfsa2023-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/
url https://www.mozilla.org/security/advisories/mfsa2023-31/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
reference_id mfsa2023-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
reference_id mfsa2023-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
23
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
24
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
25
reference_url https://access.redhat.com/errata/RHSA-2023:4460
reference_id RHSA-2023:4460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4460
26
reference_url https://access.redhat.com/errata/RHSA-2023:4461
reference_id RHSA-2023:4461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4461
27
reference_url https://access.redhat.com/errata/RHSA-2023:4462
reference_id RHSA-2023:4462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4462
28
reference_url https://access.redhat.com/errata/RHSA-2023:4463
reference_id RHSA-2023:4463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4463
29
reference_url https://access.redhat.com/errata/RHSA-2023:4464
reference_id RHSA-2023:4464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4464
30
reference_url https://access.redhat.com/errata/RHSA-2023:4465
reference_id RHSA-2023:4465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4465
31
reference_url https://access.redhat.com/errata/RHSA-2023:4468
reference_id RHSA-2023:4468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4468
32
reference_url https://access.redhat.com/errata/RHSA-2023:4469
reference_id RHSA-2023:4469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4469
33
reference_url https://access.redhat.com/errata/RHSA-2023:4492
reference_id RHSA-2023:4492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4492
34
reference_url https://access.redhat.com/errata/RHSA-2023:4493
reference_id RHSA-2023:4493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4493
35
reference_url https://access.redhat.com/errata/RHSA-2023:4494
reference_id RHSA-2023:4494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4494
36
reference_url https://access.redhat.com/errata/RHSA-2023:4495
reference_id RHSA-2023:4495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4495
37
reference_url https://access.redhat.com/errata/RHSA-2023:4496
reference_id RHSA-2023:4496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4496
38
reference_url https://access.redhat.com/errata/RHSA-2023:4497
reference_id RHSA-2023:4497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4497
39
reference_url https://access.redhat.com/errata/RHSA-2023:4499
reference_id RHSA-2023:4499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4499
40
reference_url https://access.redhat.com/errata/RHSA-2023:4500
reference_id RHSA-2023:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4500
41
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1833876
reference_id show_bug.cgi?id=1833876
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1833876
42
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
43
reference_url https://usn.ubuntu.com/6333-1/
reference_id USN-6333-1
reference_type
scores
url https://usn.ubuntu.com/6333-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4045
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sh7r-dftz-kyhn
50
url VCID-snbc-j4e3-uff1
vulnerability_id VCID-snbc-j4e3-uff1
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4582.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4582.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4582
reference_id
reference_type
scores
0
value 0.00718
scoring_system epss
scoring_elements 0.72395
published_at 2026-04-02T12:55:00Z
1
value 0.00798
scoring_system epss
scoring_elements 0.74
published_at 2026-04-08T12:55:00Z
2
value 0.00798
scoring_system epss
scoring_elements 0.74036
published_at 2026-04-11T12:55:00Z
3
value 0.00798
scoring_system epss
scoring_elements 0.73995
published_at 2026-04-04T12:55:00Z
4
value 0.00798
scoring_system epss
scoring_elements 0.73966
published_at 2026-04-07T12:55:00Z
5
value 0.00798
scoring_system epss
scoring_elements 0.74014
published_at 2026-04-09T12:55:00Z
6
value 0.00798
scoring_system epss
scoring_elements 0.74051
published_at 2026-04-21T12:55:00Z
7
value 0.00798
scoring_system epss
scoring_elements 0.74059
published_at 2026-04-18T12:55:00Z
8
value 0.00798
scoring_system epss
scoring_elements 0.7405
published_at 2026-04-16T12:55:00Z
9
value 0.00798
scoring_system epss
scoring_elements 0.74011
published_at 2026-04-13T12:55:00Z
10
value 0.00798
scoring_system epss
scoring_elements 0.74018
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4582
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236081
reference_id 2236081
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236081
3
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
reference_id mfsa2023-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
5
reference_url https://www.mozilla.org/security/advisories/mfsa2023-34/
reference_id mfsa2023-34
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T20:00:26Z/
url https://www.mozilla.org/security/advisories/mfsa2023-34/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
reference_id mfsa2023-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
7
reference_url https://www.mozilla.org/security/advisories/mfsa2023-36/
reference_id mfsa2023-36
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T20:00:26Z/
url https://www.mozilla.org/security/advisories/mfsa2023-36/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
reference_id mfsa2023-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
9
reference_url https://www.mozilla.org/security/advisories/mfsa2023-38/
reference_id mfsa2023-38
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T20:00:26Z/
url https://www.mozilla.org/security/advisories/mfsa2023-38/
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1773874
reference_id show_bug.cgi?id=1773874
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T20:00:26Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1773874
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4582
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-snbc-j4e3-uff1
51
url VCID-t4rc-yuj8-n7au
vulnerability_id VCID-t4rc-yuj8-n7au
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0746.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0746.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0746
reference_id
reference_type
scores
0
value 0.00411
scoring_system epss
scoring_elements 0.61411
published_at 2026-04-21T12:55:00Z
1
value 0.00446
scoring_system epss
scoring_elements 0.635
published_at 2026-04-16T12:55:00Z
2
value 0.00446
scoring_system epss
scoring_elements 0.63464
published_at 2026-04-04T12:55:00Z
3
value 0.00446
scoring_system epss
scoring_elements 0.63507
published_at 2026-04-18T12:55:00Z
4
value 0.00446
scoring_system epss
scoring_elements 0.6348
published_at 2026-04-08T12:55:00Z
5
value 0.00446
scoring_system epss
scoring_elements 0.63429
published_at 2026-04-07T12:55:00Z
6
value 0.00446
scoring_system epss
scoring_elements 0.63437
published_at 2026-04-02T12:55:00Z
7
value 0.00446
scoring_system epss
scoring_elements 0.63465
published_at 2026-04-13T12:55:00Z
8
value 0.00446
scoring_system epss
scoring_elements 0.63499
published_at 2026-04-12T12:55:00Z
9
value 0.00446
scoring_system epss
scoring_elements 0.63515
published_at 2026-04-11T12:55:00Z
10
value 0.00446
scoring_system epss
scoring_elements 0.63498
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0746
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2259928
reference_id 2259928
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2259928
12
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
13
reference_url https://security.gentoo.org/glsa/202402-26
reference_id GLSA-202402-26
reference_type
scores
url https://security.gentoo.org/glsa/202402-26
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
reference_id mfsa2024-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-01/
reference_id mfsa2024-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/
url https://www.mozilla.org/security/advisories/mfsa2024-01/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-02
reference_id mfsa2024-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-02
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-02/
reference_id mfsa2024-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/
url https://www.mozilla.org/security/advisories/mfsa2024-02/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-04
reference_id mfsa2024-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-04
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-04/
reference_id mfsa2024-04
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/
url https://www.mozilla.org/security/advisories/mfsa2024-04/
20
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html
21
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html
22
reference_url https://access.redhat.com/errata/RHSA-2024:0559
reference_id RHSA-2024:0559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0559
23
reference_url https://access.redhat.com/errata/RHSA-2024:0565
reference_id RHSA-2024:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0565
24
reference_url https://access.redhat.com/errata/RHSA-2024:0596
reference_id RHSA-2024:0596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0596
25
reference_url https://access.redhat.com/errata/RHSA-2024:0598
reference_id RHSA-2024:0598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0598
26
reference_url https://access.redhat.com/errata/RHSA-2024:0600
reference_id RHSA-2024:0600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0600
27
reference_url https://access.redhat.com/errata/RHSA-2024:0601
reference_id RHSA-2024:0601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0601
28
reference_url https://access.redhat.com/errata/RHSA-2024:0602
reference_id RHSA-2024:0602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0602
29
reference_url https://access.redhat.com/errata/RHSA-2024:0603
reference_id RHSA-2024:0603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0603
30
reference_url https://access.redhat.com/errata/RHSA-2024:0604
reference_id RHSA-2024:0604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0604
31
reference_url https://access.redhat.com/errata/RHSA-2024:0605
reference_id RHSA-2024:0605
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0605
32
reference_url https://access.redhat.com/errata/RHSA-2024:0608
reference_id RHSA-2024:0608
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0608
33
reference_url https://access.redhat.com/errata/RHSA-2024:0609
reference_id RHSA-2024:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0609
34
reference_url https://access.redhat.com/errata/RHSA-2024:0615
reference_id RHSA-2024:0615
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0615
35
reference_url https://access.redhat.com/errata/RHSA-2024:0616
reference_id RHSA-2024:0616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0616
36
reference_url https://access.redhat.com/errata/RHSA-2024:0618
reference_id RHSA-2024:0618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0618
37
reference_url https://access.redhat.com/errata/RHSA-2024:0619
reference_id RHSA-2024:0619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0619
38
reference_url https://access.redhat.com/errata/RHSA-2024:0622
reference_id RHSA-2024:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0622
39
reference_url https://access.redhat.com/errata/RHSA-2024:0623
reference_id RHSA-2024:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0623
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1660223
reference_id show_bug.cgi?id=1660223
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1660223
41
reference_url https://usn.ubuntu.com/6610-1/
reference_id USN-6610-1
reference_type
scores
url https://usn.ubuntu.com/6610-1/
42
reference_url https://usn.ubuntu.com/6669-1/
reference_id USN-6669-1
reference_type
scores
url https://usn.ubuntu.com/6669-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2024-0746
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t4rc-yuj8-n7au
52
url VCID-t8gg-ptc1-qfdw
vulnerability_id VCID-t8gg-ptc1-qfdw
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4056.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4056.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4056
reference_id
reference_type
scores
0
value 0.00605
scoring_system epss
scoring_elements 0.69638
published_at 2026-04-21T12:55:00Z
1
value 0.00667
scoring_system epss
scoring_elements 0.713
published_at 2026-04-16T12:55:00Z
2
value 0.00667
scoring_system epss
scoring_elements 0.71255
published_at 2026-04-13T12:55:00Z
3
value 0.00667
scoring_system epss
scoring_elements 0.71214
published_at 2026-04-02T12:55:00Z
4
value 0.00667
scoring_system epss
scoring_elements 0.71232
published_at 2026-04-04T12:55:00Z
5
value 0.00667
scoring_system epss
scoring_elements 0.71307
published_at 2026-04-18T12:55:00Z
6
value 0.00667
scoring_system epss
scoring_elements 0.71286
published_at 2026-04-11T12:55:00Z
7
value 0.00667
scoring_system epss
scoring_elements 0.71263
published_at 2026-04-09T12:55:00Z
8
value 0.00667
scoring_system epss
scoring_elements 0.71249
published_at 2026-04-08T12:55:00Z
9
value 0.00667
scoring_system epss
scoring_elements 0.71207
published_at 2026-04-07T12:55:00Z
10
value 0.00667
scoring_system epss
scoring_elements 0.7127
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4056
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228370
reference_id 2228370
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2228370
11
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1820587%2C1824634%2C1839235%2C1842325%2C1843847
reference_id buglist.cgi?bug_id=1820587%2C1824634%2C1839235%2C1842325%2C1843847
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1820587%2C1824634%2C1839235%2C1842325%2C1843847
12
reference_url https://www.debian.org/security/2023/dsa-5464
reference_id dsa-5464
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/
url https://www.debian.org/security/2023/dsa-5464
13
reference_url https://www.debian.org/security/2023/dsa-5469
reference_id dsa-5469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/
url https://www.debian.org/security/2023/dsa-5469
14
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
reference_id mfsa2023-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
18
reference_url https://www.mozilla.org/security/advisories/mfsa2023-30/
reference_id mfsa2023-30
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/
url https://www.mozilla.org/security/advisories/mfsa2023-30/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
reference_id mfsa2023-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
20
reference_url https://www.mozilla.org/security/advisories/mfsa2023-31/
reference_id mfsa2023-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/
url https://www.mozilla.org/security/advisories/mfsa2023-31/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
reference_id mfsa2023-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
reference_id mfsa2023-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
23
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
24
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
25
reference_url https://access.redhat.com/errata/RHSA-2023:4460
reference_id RHSA-2023:4460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4460
26
reference_url https://access.redhat.com/errata/RHSA-2023:4461
reference_id RHSA-2023:4461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4461
27
reference_url https://access.redhat.com/errata/RHSA-2023:4462
reference_id RHSA-2023:4462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4462
28
reference_url https://access.redhat.com/errata/RHSA-2023:4463
reference_id RHSA-2023:4463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4463
29
reference_url https://access.redhat.com/errata/RHSA-2023:4464
reference_id RHSA-2023:4464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4464
30
reference_url https://access.redhat.com/errata/RHSA-2023:4465
reference_id RHSA-2023:4465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4465
31
reference_url https://access.redhat.com/errata/RHSA-2023:4468
reference_id RHSA-2023:4468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4468
32
reference_url https://access.redhat.com/errata/RHSA-2023:4469
reference_id RHSA-2023:4469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4469
33
reference_url https://access.redhat.com/errata/RHSA-2023:4492
reference_id RHSA-2023:4492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4492
34
reference_url https://access.redhat.com/errata/RHSA-2023:4493
reference_id RHSA-2023:4493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4493
35
reference_url https://access.redhat.com/errata/RHSA-2023:4494
reference_id RHSA-2023:4494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4494
36
reference_url https://access.redhat.com/errata/RHSA-2023:4495
reference_id RHSA-2023:4495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4495
37
reference_url https://access.redhat.com/errata/RHSA-2023:4496
reference_id RHSA-2023:4496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4496
38
reference_url https://access.redhat.com/errata/RHSA-2023:4497
reference_id RHSA-2023:4497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4497
39
reference_url https://access.redhat.com/errata/RHSA-2023:4499
reference_id RHSA-2023:4499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4499
40
reference_url https://access.redhat.com/errata/RHSA-2023:4500
reference_id RHSA-2023:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4500
41
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
42
reference_url https://usn.ubuntu.com/6333-1/
reference_id USN-6333-1
reference_type
scores
url https://usn.ubuntu.com/6333-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4056
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t8gg-ptc1-qfdw
53
url VCID-tfny-yt17-mffx
vulnerability_id VCID-tfny-yt17-mffx
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4054.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4054.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4054
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09281
published_at 2026-04-09T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09254
published_at 2026-04-12T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09242
published_at 2026-04-04T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09164
published_at 2026-04-07T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09243
published_at 2026-04-08T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09284
published_at 2026-04-11T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09195
published_at 2026-04-02T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.0927
published_at 2026-04-21T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09114
published_at 2026-04-18T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09133
published_at 2026-04-16T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.0924
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4054
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228366
reference_id 2228366
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2228366
3
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
5
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
reference_id mfsa2023-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
7
reference_url https://www.mozilla.org/security/advisories/mfsa2023-30/
reference_id mfsa2023-30
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/
url https://www.mozilla.org/security/advisories/mfsa2023-30/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
reference_id mfsa2023-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
9
reference_url https://www.mozilla.org/security/advisories/mfsa2023-31/
reference_id mfsa2023-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/
url https://www.mozilla.org/security/advisories/mfsa2023-31/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
reference_id mfsa2023-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
11
reference_url https://www.mozilla.org/security/advisories/mfsa2023-32/
reference_id mfsa2023-32
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/
url https://www.mozilla.org/security/advisories/mfsa2023-32/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
reference_id mfsa2023-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
13
reference_url https://www.mozilla.org/security/advisories/mfsa2023-33/
reference_id mfsa2023-33
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/
url https://www.mozilla.org/security/advisories/mfsa2023-33/
14
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1840777
reference_id show_bug.cgi?id=1840777
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1840777
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4054
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tfny-yt17-mffx
54
url VCID-tps4-kxe2-5ugb
vulnerability_id VCID-tps4-kxe2-5ugb
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6858.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6858.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6858
reference_id
reference_type
scores
0
value 0.00417
scoring_system epss
scoring_elements 0.61769
published_at 2026-04-21T12:55:00Z
1
value 0.00452
scoring_system epss
scoring_elements 0.63778
published_at 2026-04-16T12:55:00Z
2
value 0.00452
scoring_system epss
scoring_elements 0.63723
published_at 2026-04-02T12:55:00Z
3
value 0.00452
scoring_system epss
scoring_elements 0.63748
published_at 2026-04-04T12:55:00Z
4
value 0.00452
scoring_system epss
scoring_elements 0.63788
published_at 2026-04-18T12:55:00Z
5
value 0.00452
scoring_system epss
scoring_elements 0.6376
published_at 2026-04-08T12:55:00Z
6
value 0.00452
scoring_system epss
scoring_elements 0.63708
published_at 2026-04-07T12:55:00Z
7
value 0.00452
scoring_system epss
scoring_elements 0.63742
published_at 2026-04-13T12:55:00Z
8
value 0.00452
scoring_system epss
scoring_elements 0.63776
published_at 2026-04-12T12:55:00Z
9
value 0.00452
scoring_system epss
scoring_elements 0.63791
published_at 2026-04-11T12:55:00Z
10
value 0.00452
scoring_system epss
scoring_elements 0.63777
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6858
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255363
reference_id 2255363
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255363
17
reference_url https://www.debian.org/security/2023/dsa-5581
reference_id dsa-5581
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://www.debian.org/security/2023/dsa-5581
18
reference_url https://www.debian.org/security/2023/dsa-5582
reference_id dsa-5582
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://www.debian.org/security/2023/dsa-5582
19
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
21
reference_url https://www.mozilla.org/security/advisories/mfsa2023-54/
reference_id mfsa2023-54
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://www.mozilla.org/security/advisories/mfsa2023-54/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
23
reference_url https://www.mozilla.org/security/advisories/mfsa2023-55/
reference_id mfsa2023-55
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://www.mozilla.org/security/advisories/mfsa2023-55/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
25
reference_url https://www.mozilla.org/security/advisories/mfsa2023-56/
reference_id mfsa2023-56
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://www.mozilla.org/security/advisories/mfsa2023-56/
26
reference_url https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html
reference_id msg00020.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html
27
reference_url https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html
28
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
29
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
30
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
31
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
32
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
33
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
34
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
35
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
36
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
37
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
38
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
39
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
40
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
41
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
42
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
43
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
44
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
45
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
46
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1826791
reference_id show_bug.cgi?id=1826791
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1826791
47
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
48
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-6858
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tps4-kxe2-5ugb
55
url VCID-tq43-rx5u-eybv
vulnerability_id VCID-tq43-rx5u-eybv
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4583.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4583.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4583
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.34978
published_at 2026-04-08T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.35011
published_at 2026-04-11T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35053
published_at 2026-04-04T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.34933
published_at 2026-04-07T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.35007
published_at 2026-04-09T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35026
published_at 2026-04-02T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.34931
published_at 2026-04-21T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.34974
published_at 2026-04-18T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.3499
published_at 2026-04-16T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.34951
published_at 2026-04-13T12:55:00Z
10
value 0.00146
scoring_system epss
scoring_elements 0.34975
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4583
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236082
reference_id 2236082
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236082
3
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
reference_id mfsa2023-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-34
5
reference_url https://www.mozilla.org/security/advisories/mfsa2023-34/
reference_id mfsa2023-34
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-19T19:09:13Z/
url https://www.mozilla.org/security/advisories/mfsa2023-34/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
reference_id mfsa2023-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
7
reference_url https://www.mozilla.org/security/advisories/mfsa2023-36/
reference_id mfsa2023-36
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-19T19:09:13Z/
url https://www.mozilla.org/security/advisories/mfsa2023-36/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
reference_id mfsa2023-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
9
reference_url https://www.mozilla.org/security/advisories/mfsa2023-38/
reference_id mfsa2023-38
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-19T19:09:13Z/
url https://www.mozilla.org/security/advisories/mfsa2023-38/
10
reference_url https://access.redhat.com/errata/RHSA-2023:4945
reference_id RHSA-2023:4945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4945
11
reference_url https://access.redhat.com/errata/RHSA-2023:4946
reference_id RHSA-2023:4946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4946
12
reference_url https://access.redhat.com/errata/RHSA-2023:4947
reference_id RHSA-2023:4947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4947
13
reference_url https://access.redhat.com/errata/RHSA-2023:4948
reference_id RHSA-2023:4948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4948
14
reference_url https://access.redhat.com/errata/RHSA-2023:4949
reference_id RHSA-2023:4949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4949
15
reference_url https://access.redhat.com/errata/RHSA-2023:4950
reference_id RHSA-2023:4950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4950
16
reference_url https://access.redhat.com/errata/RHSA-2023:4951
reference_id RHSA-2023:4951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4951
17
reference_url https://access.redhat.com/errata/RHSA-2023:4952
reference_id RHSA-2023:4952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4952
18
reference_url https://access.redhat.com/errata/RHSA-2023:4954
reference_id RHSA-2023:4954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4954
19
reference_url https://access.redhat.com/errata/RHSA-2023:4955
reference_id RHSA-2023:4955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4955
20
reference_url https://access.redhat.com/errata/RHSA-2023:4956
reference_id RHSA-2023:4956
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4956
21
reference_url https://access.redhat.com/errata/RHSA-2023:4957
reference_id RHSA-2023:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4957
22
reference_url https://access.redhat.com/errata/RHSA-2023:4958
reference_id RHSA-2023:4958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4958
23
reference_url https://access.redhat.com/errata/RHSA-2023:4959
reference_id RHSA-2023:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4959
24
reference_url https://access.redhat.com/errata/RHSA-2023:5019
reference_id RHSA-2023:5019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5019
25
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1842030
reference_id show_bug.cgi?id=1842030
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-19T19:09:13Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1842030
26
reference_url https://usn.ubuntu.com/6320-1/
reference_id USN-6320-1
reference_type
scores
url https://usn.ubuntu.com/6320-1/
27
reference_url https://usn.ubuntu.com/6405-1/
reference_id USN-6405-1
reference_type
scores
url https://usn.ubuntu.com/6405-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4583
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tq43-rx5u-eybv
56
url VCID-tutg-2zzk-4uam
vulnerability_id VCID-tutg-2zzk-4uam
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6207.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6207.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6207
reference_id
reference_type
scores
0
value 0.00456
scoring_system epss
scoring_elements 0.63915
published_at 2026-04-18T12:55:00Z
1
value 0.00456
scoring_system epss
scoring_elements 0.63917
published_at 2026-04-11T12:55:00Z
2
value 0.00456
scoring_system epss
scoring_elements 0.6387
published_at 2026-04-13T12:55:00Z
3
value 0.00456
scoring_system epss
scoring_elements 0.63906
published_at 2026-04-21T12:55:00Z
4
value 0.00456
scoring_system epss
scoring_elements 0.63852
published_at 2026-04-02T12:55:00Z
5
value 0.00456
scoring_system epss
scoring_elements 0.63879
published_at 2026-04-04T12:55:00Z
6
value 0.00456
scoring_system epss
scoring_elements 0.63836
published_at 2026-04-07T12:55:00Z
7
value 0.00456
scoring_system epss
scoring_elements 0.63887
published_at 2026-04-08T12:55:00Z
8
value 0.00456
scoring_system epss
scoring_elements 0.63904
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6207
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2250899
reference_id 2250899
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2250899
10
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
reference_id mfsa2023-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-50
reference_id mfsa2023-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-50
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-52
reference_id mfsa2023-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-52
14
reference_url https://access.redhat.com/errata/RHSA-2023:7499
reference_id RHSA-2023:7499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7499
15
reference_url https://access.redhat.com/errata/RHSA-2023:7500
reference_id RHSA-2023:7500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7500
16
reference_url https://access.redhat.com/errata/RHSA-2023:7501
reference_id RHSA-2023:7501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7501
17
reference_url https://access.redhat.com/errata/RHSA-2023:7502
reference_id RHSA-2023:7502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7502
18
reference_url https://access.redhat.com/errata/RHSA-2023:7503
reference_id RHSA-2023:7503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7503
19
reference_url https://access.redhat.com/errata/RHSA-2023:7504
reference_id RHSA-2023:7504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7504
20
reference_url https://access.redhat.com/errata/RHSA-2023:7505
reference_id RHSA-2023:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7505
21
reference_url https://access.redhat.com/errata/RHSA-2023:7506
reference_id RHSA-2023:7506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7506
22
reference_url https://access.redhat.com/errata/RHSA-2023:7507
reference_id RHSA-2023:7507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7507
23
reference_url https://access.redhat.com/errata/RHSA-2023:7508
reference_id RHSA-2023:7508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7508
24
reference_url https://access.redhat.com/errata/RHSA-2023:7509
reference_id RHSA-2023:7509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7509
25
reference_url https://access.redhat.com/errata/RHSA-2023:7510
reference_id RHSA-2023:7510
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7510
26
reference_url https://access.redhat.com/errata/RHSA-2023:7511
reference_id RHSA-2023:7511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7511
27
reference_url https://access.redhat.com/errata/RHSA-2023:7512
reference_id RHSA-2023:7512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7512
28
reference_url https://access.redhat.com/errata/RHSA-2023:7547
reference_id RHSA-2023:7547
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7547
29
reference_url https://access.redhat.com/errata/RHSA-2023:7569
reference_id RHSA-2023:7569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7569
30
reference_url https://access.redhat.com/errata/RHSA-2023:7570
reference_id RHSA-2023:7570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7570
31
reference_url https://access.redhat.com/errata/RHSA-2023:7573
reference_id RHSA-2023:7573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7573
32
reference_url https://access.redhat.com/errata/RHSA-2023:7574
reference_id RHSA-2023:7574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7574
33
reference_url https://access.redhat.com/errata/RHSA-2023:7577
reference_id RHSA-2023:7577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7577
34
reference_url https://usn.ubuntu.com/6509-1/
reference_id USN-6509-1
reference_type
scores
url https://usn.ubuntu.com/6509-1/
35
reference_url https://usn.ubuntu.com/6515-1/
reference_id USN-6515-1
reference_type
scores
url https://usn.ubuntu.com/6515-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-6207
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tutg-2zzk-4uam
57
url VCID-uh95-a456-7kbx
vulnerability_id VCID-uh95-a456-7kbx
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0747.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0747.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0747
reference_id
reference_type
scores
0
value 0.00448
scoring_system epss
scoring_elements 0.6358
published_at 2026-04-18T12:55:00Z
1
value 0.00448
scoring_system epss
scoring_elements 0.63537
published_at 2026-04-13T12:55:00Z
2
value 0.00448
scoring_system epss
scoring_elements 0.6357
published_at 2026-04-09T12:55:00Z
3
value 0.00448
scoring_system epss
scoring_elements 0.63553
published_at 2026-04-08T12:55:00Z
4
value 0.00448
scoring_system epss
scoring_elements 0.63501
published_at 2026-04-07T12:55:00Z
5
value 0.00448
scoring_system epss
scoring_elements 0.6351
published_at 2026-04-02T12:55:00Z
6
value 0.00448
scoring_system epss
scoring_elements 0.63572
published_at 2026-04-16T12:55:00Z
7
value 0.00448
scoring_system epss
scoring_elements 0.63571
published_at 2026-04-12T12:55:00Z
8
value 0.00448
scoring_system epss
scoring_elements 0.63586
published_at 2026-04-11T12:55:00Z
9
value 0.00462
scoring_system epss
scoring_elements 0.64214
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0747
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2259929
reference_id 2259929
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2259929
12
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
13
reference_url https://security.gentoo.org/glsa/202402-26
reference_id GLSA-202402-26
reference_type
scores
url https://security.gentoo.org/glsa/202402-26
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
reference_id mfsa2024-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-01/
reference_id mfsa2024-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/
url https://www.mozilla.org/security/advisories/mfsa2024-01/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-02
reference_id mfsa2024-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-02
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-02/
reference_id mfsa2024-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/
url https://www.mozilla.org/security/advisories/mfsa2024-02/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-04
reference_id mfsa2024-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-04
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-04/
reference_id mfsa2024-04
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/
url https://www.mozilla.org/security/advisories/mfsa2024-04/
20
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html
21
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html
22
reference_url https://access.redhat.com/errata/RHSA-2024:0559
reference_id RHSA-2024:0559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0559
23
reference_url https://access.redhat.com/errata/RHSA-2024:0565
reference_id RHSA-2024:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0565
24
reference_url https://access.redhat.com/errata/RHSA-2024:0596
reference_id RHSA-2024:0596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0596
25
reference_url https://access.redhat.com/errata/RHSA-2024:0598
reference_id RHSA-2024:0598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0598
26
reference_url https://access.redhat.com/errata/RHSA-2024:0600
reference_id RHSA-2024:0600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0600
27
reference_url https://access.redhat.com/errata/RHSA-2024:0601
reference_id RHSA-2024:0601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0601
28
reference_url https://access.redhat.com/errata/RHSA-2024:0602
reference_id RHSA-2024:0602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0602
29
reference_url https://access.redhat.com/errata/RHSA-2024:0603
reference_id RHSA-2024:0603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0603
30
reference_url https://access.redhat.com/errata/RHSA-2024:0604
reference_id RHSA-2024:0604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0604
31
reference_url https://access.redhat.com/errata/RHSA-2024:0605
reference_id RHSA-2024:0605
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0605
32
reference_url https://access.redhat.com/errata/RHSA-2024:0608
reference_id RHSA-2024:0608
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0608
33
reference_url https://access.redhat.com/errata/RHSA-2024:0609
reference_id RHSA-2024:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0609
34
reference_url https://access.redhat.com/errata/RHSA-2024:0615
reference_id RHSA-2024:0615
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0615
35
reference_url https://access.redhat.com/errata/RHSA-2024:0616
reference_id RHSA-2024:0616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0616
36
reference_url https://access.redhat.com/errata/RHSA-2024:0618
reference_id RHSA-2024:0618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0618
37
reference_url https://access.redhat.com/errata/RHSA-2024:0619
reference_id RHSA-2024:0619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0619
38
reference_url https://access.redhat.com/errata/RHSA-2024:0622
reference_id RHSA-2024:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0622
39
reference_url https://access.redhat.com/errata/RHSA-2024:0623
reference_id RHSA-2024:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0623
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1764343
reference_id show_bug.cgi?id=1764343
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1764343
41
reference_url https://usn.ubuntu.com/6610-1/
reference_id USN-6610-1
reference_type
scores
url https://usn.ubuntu.com/6610-1/
42
reference_url https://usn.ubuntu.com/6669-1/
reference_id USN-6669-1
reference_type
scores
url https://usn.ubuntu.com/6669-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2024-0747
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uh95-a456-7kbx
58
url VCID-vjw1-g5kk-zuda
vulnerability_id VCID-vjw1-g5kk-zuda
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4046.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4046.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4046
reference_id
reference_type
scores
0
value 0.00214
scoring_system epss
scoring_elements 0.43933
published_at 2026-04-21T12:55:00Z
1
value 0.00296
scoring_system epss
scoring_elements 0.52898
published_at 2026-04-16T12:55:00Z
2
value 0.00296
scoring_system epss
scoring_elements 0.52862
published_at 2026-04-13T12:55:00Z
3
value 0.00296
scoring_system epss
scoring_elements 0.52804
published_at 2026-04-02T12:55:00Z
4
value 0.00296
scoring_system epss
scoring_elements 0.5283
published_at 2026-04-04T12:55:00Z
5
value 0.00296
scoring_system epss
scoring_elements 0.52906
published_at 2026-04-18T12:55:00Z
6
value 0.00296
scoring_system epss
scoring_elements 0.52894
published_at 2026-04-11T12:55:00Z
7
value 0.00296
scoring_system epss
scoring_elements 0.52843
published_at 2026-04-09T12:55:00Z
8
value 0.00296
scoring_system epss
scoring_elements 0.52849
published_at 2026-04-08T12:55:00Z
9
value 0.00296
scoring_system epss
scoring_elements 0.52798
published_at 2026-04-07T12:55:00Z
10
value 0.00296
scoring_system epss
scoring_elements 0.52878
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4046
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228361
reference_id 2228361
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2228361
11
reference_url https://www.debian.org/security/2023/dsa-5464
reference_id dsa-5464
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/
url https://www.debian.org/security/2023/dsa-5464
12
reference_url https://www.debian.org/security/2023/dsa-5469
reference_id dsa-5469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/
url https://www.debian.org/security/2023/dsa-5469
13
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
15
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
reference_id mfsa2023-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-30
17
reference_url https://www.mozilla.org/security/advisories/mfsa2023-30/
reference_id mfsa2023-30
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/
url https://www.mozilla.org/security/advisories/mfsa2023-30/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
reference_id mfsa2023-31
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-31
19
reference_url https://www.mozilla.org/security/advisories/mfsa2023-31/
reference_id mfsa2023-31
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/
url https://www.mozilla.org/security/advisories/mfsa2023-31/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
reference_id mfsa2023-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-32
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
reference_id mfsa2023-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-33
22
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html
23
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html
24
reference_url https://access.redhat.com/errata/RHSA-2023:4460
reference_id RHSA-2023:4460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4460
25
reference_url https://access.redhat.com/errata/RHSA-2023:4461
reference_id RHSA-2023:4461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4461
26
reference_url https://access.redhat.com/errata/RHSA-2023:4462
reference_id RHSA-2023:4462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4462
27
reference_url https://access.redhat.com/errata/RHSA-2023:4463
reference_id RHSA-2023:4463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4463
28
reference_url https://access.redhat.com/errata/RHSA-2023:4464
reference_id RHSA-2023:4464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4464
29
reference_url https://access.redhat.com/errata/RHSA-2023:4465
reference_id RHSA-2023:4465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4465
30
reference_url https://access.redhat.com/errata/RHSA-2023:4468
reference_id RHSA-2023:4468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4468
31
reference_url https://access.redhat.com/errata/RHSA-2023:4469
reference_id RHSA-2023:4469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4469
32
reference_url https://access.redhat.com/errata/RHSA-2023:4492
reference_id RHSA-2023:4492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4492
33
reference_url https://access.redhat.com/errata/RHSA-2023:4493
reference_id RHSA-2023:4493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4493
34
reference_url https://access.redhat.com/errata/RHSA-2023:4494
reference_id RHSA-2023:4494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4494
35
reference_url https://access.redhat.com/errata/RHSA-2023:4495
reference_id RHSA-2023:4495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4495
36
reference_url https://access.redhat.com/errata/RHSA-2023:4496
reference_id RHSA-2023:4496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4496
37
reference_url https://access.redhat.com/errata/RHSA-2023:4497
reference_id RHSA-2023:4497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4497
38
reference_url https://access.redhat.com/errata/RHSA-2023:4499
reference_id RHSA-2023:4499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4499
39
reference_url https://access.redhat.com/errata/RHSA-2023:4500
reference_id RHSA-2023:4500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4500
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1837686
reference_id show_bug.cgi?id=1837686
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1837686
41
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
42
reference_url https://usn.ubuntu.com/6333-1/
reference_id USN-6333-1
reference_type
scores
url https://usn.ubuntu.com/6333-1/
43
reference_url https://usn.ubuntu.com/6406-1/
reference_id USN-6406-1
reference_type
scores
url https://usn.ubuntu.com/6406-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4046
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vjw1-g5kk-zuda
59
url VCID-vma9-r6uy-p7c1
vulnerability_id VCID-vma9-r6uy-p7c1
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6208.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6208
reference_id
reference_type
scores
0
value 0.00457
scoring_system epss
scoring_elements 0.63973
published_at 2026-04-21T12:55:00Z
1
value 0.00457
scoring_system epss
scoring_elements 0.63939
published_at 2026-04-13T12:55:00Z
2
value 0.00457
scoring_system epss
scoring_elements 0.63975
published_at 2026-04-16T12:55:00Z
3
value 0.00457
scoring_system epss
scoring_elements 0.63985
published_at 2026-04-18T12:55:00Z
4
value 0.00457
scoring_system epss
scoring_elements 0.6392
published_at 2026-04-02T12:55:00Z
5
value 0.00457
scoring_system epss
scoring_elements 0.63947
published_at 2026-04-04T12:55:00Z
6
value 0.00457
scoring_system epss
scoring_elements 0.63906
published_at 2026-04-07T12:55:00Z
7
value 0.00457
scoring_system epss
scoring_elements 0.63956
published_at 2026-04-08T12:55:00Z
8
value 0.00457
scoring_system epss
scoring_elements 0.63974
published_at 2026-04-09T12:55:00Z
9
value 0.00457
scoring_system epss
scoring_elements 0.63986
published_at 2026-04-11T12:55:00Z
10
value 0.00457
scoring_system epss
scoring_elements 0.63972
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6208
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2250900
reference_id 2250900
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2250900
10
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
reference_id mfsa2023-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-50
reference_id mfsa2023-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-50
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-52
reference_id mfsa2023-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-52
14
reference_url https://access.redhat.com/errata/RHSA-2023:7499
reference_id RHSA-2023:7499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7499
15
reference_url https://access.redhat.com/errata/RHSA-2023:7500
reference_id RHSA-2023:7500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7500
16
reference_url https://access.redhat.com/errata/RHSA-2023:7501
reference_id RHSA-2023:7501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7501
17
reference_url https://access.redhat.com/errata/RHSA-2023:7502
reference_id RHSA-2023:7502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7502
18
reference_url https://access.redhat.com/errata/RHSA-2023:7503
reference_id RHSA-2023:7503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7503
19
reference_url https://access.redhat.com/errata/RHSA-2023:7504
reference_id RHSA-2023:7504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7504
20
reference_url https://access.redhat.com/errata/RHSA-2023:7505
reference_id RHSA-2023:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7505
21
reference_url https://access.redhat.com/errata/RHSA-2023:7506
reference_id RHSA-2023:7506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7506
22
reference_url https://access.redhat.com/errata/RHSA-2023:7507
reference_id RHSA-2023:7507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7507
23
reference_url https://access.redhat.com/errata/RHSA-2023:7508
reference_id RHSA-2023:7508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7508
24
reference_url https://access.redhat.com/errata/RHSA-2023:7509
reference_id RHSA-2023:7509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7509
25
reference_url https://access.redhat.com/errata/RHSA-2023:7510
reference_id RHSA-2023:7510
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7510
26
reference_url https://access.redhat.com/errata/RHSA-2023:7511
reference_id RHSA-2023:7511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7511
27
reference_url https://access.redhat.com/errata/RHSA-2023:7512
reference_id RHSA-2023:7512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7512
28
reference_url https://access.redhat.com/errata/RHSA-2023:7547
reference_id RHSA-2023:7547
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7547
29
reference_url https://access.redhat.com/errata/RHSA-2023:7569
reference_id RHSA-2023:7569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7569
30
reference_url https://access.redhat.com/errata/RHSA-2023:7570
reference_id RHSA-2023:7570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7570
31
reference_url https://access.redhat.com/errata/RHSA-2023:7573
reference_id RHSA-2023:7573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7573
32
reference_url https://access.redhat.com/errata/RHSA-2023:7574
reference_id RHSA-2023:7574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7574
33
reference_url https://access.redhat.com/errata/RHSA-2023:7577
reference_id RHSA-2023:7577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7577
34
reference_url https://usn.ubuntu.com/6509-1/
reference_id USN-6509-1
reference_type
scores
url https://usn.ubuntu.com/6509-1/
35
reference_url https://usn.ubuntu.com/6515-1/
reference_id USN-6515-1
reference_type
scores
url https://usn.ubuntu.com/6515-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-6208
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vma9-r6uy-p7c1
60
url VCID-vmm4-dq3p-kqhu
vulnerability_id VCID-vmm4-dq3p-kqhu
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37211.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37211.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-37211
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.64499
published_at 2026-04-21T12:55:00Z
1
value 0.0056
scoring_system epss
scoring_elements 0.68222
published_at 2026-04-02T12:55:00Z
2
value 0.0056
scoring_system epss
scoring_elements 0.68267
published_at 2026-04-08T12:55:00Z
3
value 0.0056
scoring_system epss
scoring_elements 0.68312
published_at 2026-04-18T12:55:00Z
4
value 0.0056
scoring_system epss
scoring_elements 0.68308
published_at 2026-04-11T12:55:00Z
5
value 0.0056
scoring_system epss
scoring_elements 0.68241
published_at 2026-04-04T12:55:00Z
6
value 0.0056
scoring_system epss
scoring_elements 0.68216
published_at 2026-04-07T12:55:00Z
7
value 0.0056
scoring_system epss
scoring_elements 0.68282
published_at 2026-04-09T12:55:00Z
8
value 0.0056
scoring_system epss
scoring_elements 0.68301
published_at 2026-04-16T12:55:00Z
9
value 0.0056
scoring_system epss
scoring_elements 0.68261
published_at 2026-04-13T12:55:00Z
10
value 0.0056
scoring_system epss
scoring_elements 0.68295
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-37211
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2219751
reference_id 2219751
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2219751
8
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1832306%2C1834862%2C1835886%2C1836550%2C1837450
reference_id buglist.cgi?bug_id=1832306%2C1834862%2C1835886%2C1836550%2C1837450
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1832306%2C1834862%2C1835886%2C1836550%2C1837450
9
reference_url https://www.debian.org/security/2023/dsa-5450
reference_id dsa-5450
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/
url https://www.debian.org/security/2023/dsa-5450
10
reference_url https://www.debian.org/security/2023/dsa-5451
reference_id dsa-5451
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/
url https://www.debian.org/security/2023/dsa-5451
11
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
reference_id mfsa2023-22
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-22
13
reference_url https://www.mozilla.org/security/advisories/mfsa2023-22/
reference_id mfsa2023-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/
url https://www.mozilla.org/security/advisories/mfsa2023-22/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-23
reference_id mfsa2023-23
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-23
15
reference_url https://www.mozilla.org/security/advisories/mfsa2023-23/
reference_id mfsa2023-23
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/
url https://www.mozilla.org/security/advisories/mfsa2023-23/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-24
reference_id mfsa2023-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-24
17
reference_url https://www.mozilla.org/security/advisories/mfsa2023-24/
reference_id mfsa2023-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/
url https://www.mozilla.org/security/advisories/mfsa2023-24/
18
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html
19
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html
20
reference_url https://access.redhat.com/errata/RHSA-2023:4062
reference_id RHSA-2023:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4062
21
reference_url https://access.redhat.com/errata/RHSA-2023:4063
reference_id RHSA-2023:4063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4063
22
reference_url https://access.redhat.com/errata/RHSA-2023:4064
reference_id RHSA-2023:4064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4064
23
reference_url https://access.redhat.com/errata/RHSA-2023:4065
reference_id RHSA-2023:4065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4065
24
reference_url https://access.redhat.com/errata/RHSA-2023:4066
reference_id RHSA-2023:4066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4066
25
reference_url https://access.redhat.com/errata/RHSA-2023:4067
reference_id RHSA-2023:4067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4067
26
reference_url https://access.redhat.com/errata/RHSA-2023:4068
reference_id RHSA-2023:4068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4068
27
reference_url https://access.redhat.com/errata/RHSA-2023:4069
reference_id RHSA-2023:4069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4069
28
reference_url https://access.redhat.com/errata/RHSA-2023:4070
reference_id RHSA-2023:4070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4070
29
reference_url https://access.redhat.com/errata/RHSA-2023:4071
reference_id RHSA-2023:4071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4071
30
reference_url https://access.redhat.com/errata/RHSA-2023:4072
reference_id RHSA-2023:4072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4072
31
reference_url https://access.redhat.com/errata/RHSA-2023:4073
reference_id RHSA-2023:4073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4073
32
reference_url https://access.redhat.com/errata/RHSA-2023:4074
reference_id RHSA-2023:4074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4074
33
reference_url https://access.redhat.com/errata/RHSA-2023:4075
reference_id RHSA-2023:4075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4075
34
reference_url https://access.redhat.com/errata/RHSA-2023:4076
reference_id RHSA-2023:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4076
35
reference_url https://access.redhat.com/errata/RHSA-2023:4079
reference_id RHSA-2023:4079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4079
36
reference_url https://usn.ubuntu.com/6201-1/
reference_id USN-6201-1
reference_type
scores
url https://usn.ubuntu.com/6201-1/
37
reference_url https://usn.ubuntu.com/6214-1/
reference_id USN-6214-1
reference_type
scores
url https://usn.ubuntu.com/6214-1/
38
reference_url https://usn.ubuntu.com/6227-1/
reference_id USN-6227-1
reference_type
scores
url https://usn.ubuntu.com/6227-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-37211
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vmm4-dq3p-kqhu
61
url VCID-vw4n-4r41-ukbp
vulnerability_id VCID-vw4n-4r41-ukbp
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5727.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5727.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5727
reference_id
reference_type
scores
0
value 0.00212
scoring_system epss
scoring_elements 0.43728
published_at 2026-04-21T12:55:00Z
1
value 0.00212
scoring_system epss
scoring_elements 0.43795
published_at 2026-04-18T12:55:00Z
2
value 0.00212
scoring_system epss
scoring_elements 0.43771
published_at 2026-04-09T12:55:00Z
3
value 0.00212
scoring_system epss
scoring_elements 0.43716
published_at 2026-04-07T12:55:00Z
4
value 0.00212
scoring_system epss
scoring_elements 0.43767
published_at 2026-04-08T12:55:00Z
5
value 0.00212
scoring_system epss
scoring_elements 0.43758
published_at 2026-04-12T12:55:00Z
6
value 0.00212
scoring_system epss
scoring_elements 0.43804
published_at 2026-04-16T12:55:00Z
7
value 0.00212
scoring_system epss
scoring_elements 0.43742
published_at 2026-04-13T12:55:00Z
8
value 0.00212
scoring_system epss
scoring_elements 0.43791
published_at 2026-04-11T12:55:00Z
9
value 0.00212
scoring_system epss
scoring_elements 0.43783
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5727
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245902
reference_id 2245902
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245902
4
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-45
reference_id mfsa2023-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-45
6
reference_url https://www.mozilla.org/security/advisories/mfsa2023-45/
reference_id mfsa2023-45
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:47:05Z/
url https://www.mozilla.org/security/advisories/mfsa2023-45/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-46
reference_id mfsa2023-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2023-46/
reference_id mfsa2023-46
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:47:05Z/
url https://www.mozilla.org/security/advisories/mfsa2023-46/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-47
reference_id mfsa2023-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-47
10
reference_url https://www.mozilla.org/security/advisories/mfsa2023-47/
reference_id mfsa2023-47
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:47:05Z/
url https://www.mozilla.org/security/advisories/mfsa2023-47/
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1847180
reference_id show_bug.cgi?id=1847180
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:47:05Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1847180
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-5727
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vw4n-4r41-ukbp
62
url VCID-vwkf-9gfp-d3cy
vulnerability_id VCID-vwkf-9gfp-d3cy
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0749.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0749.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0749
reference_id
reference_type
scores
0
value 0.00327
scoring_system epss
scoring_elements 0.5569
published_at 2026-04-12T12:55:00Z
1
value 0.00327
scoring_system epss
scoring_elements 0.55712
published_at 2026-04-16T12:55:00Z
2
value 0.00327
scoring_system epss
scoring_elements 0.55672
published_at 2026-04-13T12:55:00Z
3
value 0.00327
scoring_system epss
scoring_elements 0.55644
published_at 2026-04-02T12:55:00Z
4
value 0.00327
scoring_system epss
scoring_elements 0.55669
published_at 2026-04-04T12:55:00Z
5
value 0.00327
scoring_system epss
scoring_elements 0.55646
published_at 2026-04-07T12:55:00Z
6
value 0.00327
scoring_system epss
scoring_elements 0.55698
published_at 2026-04-08T12:55:00Z
7
value 0.00327
scoring_system epss
scoring_elements 0.55701
published_at 2026-04-09T12:55:00Z
8
value 0.00327
scoring_system epss
scoring_elements 0.5571
published_at 2026-04-11T12:55:00Z
9
value 0.00327
scoring_system epss
scoring_elements 0.55715
published_at 2026-04-18T12:55:00Z
10
value 0.00338
scoring_system epss
scoring_elements 0.56593
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0749
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2259930
reference_id 2259930
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2259930
12
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
13
reference_url https://security.gentoo.org/glsa/202402-26
reference_id GLSA-202402-26
reference_type
scores
url https://security.gentoo.org/glsa/202402-26
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
reference_id mfsa2024-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-01/
reference_id mfsa2024-01
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-29T19:41:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-01/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-04
reference_id mfsa2024-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-04
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-04/
reference_id mfsa2024-04
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-29T19:41:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-04/
18
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-29T19:41:27Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html
19
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-29T19:41:27Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html
20
reference_url https://access.redhat.com/errata/RHSA-2024:0559
reference_id RHSA-2024:0559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0559
21
reference_url https://access.redhat.com/errata/RHSA-2024:0565
reference_id RHSA-2024:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0565
22
reference_url https://access.redhat.com/errata/RHSA-2024:0596
reference_id RHSA-2024:0596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0596
23
reference_url https://access.redhat.com/errata/RHSA-2024:0598
reference_id RHSA-2024:0598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0598
24
reference_url https://access.redhat.com/errata/RHSA-2024:0600
reference_id RHSA-2024:0600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0600
25
reference_url https://access.redhat.com/errata/RHSA-2024:0601
reference_id RHSA-2024:0601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0601
26
reference_url https://access.redhat.com/errata/RHSA-2024:0602
reference_id RHSA-2024:0602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0602
27
reference_url https://access.redhat.com/errata/RHSA-2024:0603
reference_id RHSA-2024:0603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0603
28
reference_url https://access.redhat.com/errata/RHSA-2024:0604
reference_id RHSA-2024:0604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0604
29
reference_url https://access.redhat.com/errata/RHSA-2024:0605
reference_id RHSA-2024:0605
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0605
30
reference_url https://access.redhat.com/errata/RHSA-2024:0608
reference_id RHSA-2024:0608
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0608
31
reference_url https://access.redhat.com/errata/RHSA-2024:0609
reference_id RHSA-2024:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0609
32
reference_url https://access.redhat.com/errata/RHSA-2024:0615
reference_id RHSA-2024:0615
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0615
33
reference_url https://access.redhat.com/errata/RHSA-2024:0616
reference_id RHSA-2024:0616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0616
34
reference_url https://access.redhat.com/errata/RHSA-2024:0618
reference_id RHSA-2024:0618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0618
35
reference_url https://access.redhat.com/errata/RHSA-2024:0619
reference_id RHSA-2024:0619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0619
36
reference_url https://access.redhat.com/errata/RHSA-2024:0622
reference_id RHSA-2024:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0622
37
reference_url https://access.redhat.com/errata/RHSA-2024:0623
reference_id RHSA-2024:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0623
38
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1813463
reference_id show_bug.cgi?id=1813463
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-29T19:41:27Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1813463
39
reference_url https://usn.ubuntu.com/6610-1/
reference_id USN-6610-1
reference_type
scores
url https://usn.ubuntu.com/6610-1/
40
reference_url https://usn.ubuntu.com/6669-1/
reference_id USN-6669-1
reference_type
scores
url https://usn.ubuntu.com/6669-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2024-0749
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vwkf-9gfp-d3cy
63
url VCID-xan8-8fq6-yfgd
vulnerability_id VCID-xan8-8fq6-yfgd
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0742.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0742.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0742
reference_id
reference_type
scores
0
value 0.01786
scoring_system epss
scoring_elements 0.82773
published_at 2026-04-18T12:55:00Z
1
value 0.01786
scoring_system epss
scoring_elements 0.82698
published_at 2026-04-04T12:55:00Z
2
value 0.01786
scoring_system epss
scoring_elements 0.82727
published_at 2026-04-09T12:55:00Z
3
value 0.01786
scoring_system epss
scoring_elements 0.8272
published_at 2026-04-08T12:55:00Z
4
value 0.01786
scoring_system epss
scoring_elements 0.82694
published_at 2026-04-07T12:55:00Z
5
value 0.01786
scoring_system epss
scoring_elements 0.82684
published_at 2026-04-02T12:55:00Z
6
value 0.01786
scoring_system epss
scoring_elements 0.82735
published_at 2026-04-13T12:55:00Z
7
value 0.01786
scoring_system epss
scoring_elements 0.82738
published_at 2026-04-12T12:55:00Z
8
value 0.01786
scoring_system epss
scoring_elements 0.82744
published_at 2026-04-11T12:55:00Z
9
value 0.01842
scoring_system epss
scoring_elements 0.83001
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0742
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2259927
reference_id 2259927
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2259927
12
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
13
reference_url https://security.gentoo.org/glsa/202402-26
reference_id GLSA-202402-26
reference_type
scores
url https://security.gentoo.org/glsa/202402-26
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
reference_id mfsa2024-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-01/
reference_id mfsa2024-01
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-01/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-02
reference_id mfsa2024-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-02
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-02/
reference_id mfsa2024-02
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-02/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-04
reference_id mfsa2024-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-04
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-04/
reference_id mfsa2024-04
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-04/
20
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html
21
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html
22
reference_url https://access.redhat.com/errata/RHSA-2024:0559
reference_id RHSA-2024:0559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0559
23
reference_url https://access.redhat.com/errata/RHSA-2024:0565
reference_id RHSA-2024:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0565
24
reference_url https://access.redhat.com/errata/RHSA-2024:0596
reference_id RHSA-2024:0596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0596
25
reference_url https://access.redhat.com/errata/RHSA-2024:0598
reference_id RHSA-2024:0598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0598
26
reference_url https://access.redhat.com/errata/RHSA-2024:0600
reference_id RHSA-2024:0600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0600
27
reference_url https://access.redhat.com/errata/RHSA-2024:0601
reference_id RHSA-2024:0601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0601
28
reference_url https://access.redhat.com/errata/RHSA-2024:0602
reference_id RHSA-2024:0602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0602
29
reference_url https://access.redhat.com/errata/RHSA-2024:0603
reference_id RHSA-2024:0603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0603
30
reference_url https://access.redhat.com/errata/RHSA-2024:0604
reference_id RHSA-2024:0604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0604
31
reference_url https://access.redhat.com/errata/RHSA-2024:0605
reference_id RHSA-2024:0605
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0605
32
reference_url https://access.redhat.com/errata/RHSA-2024:0608
reference_id RHSA-2024:0608
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0608
33
reference_url https://access.redhat.com/errata/RHSA-2024:0609
reference_id RHSA-2024:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0609
34
reference_url https://access.redhat.com/errata/RHSA-2024:0615
reference_id RHSA-2024:0615
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0615
35
reference_url https://access.redhat.com/errata/RHSA-2024:0616
reference_id RHSA-2024:0616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0616
36
reference_url https://access.redhat.com/errata/RHSA-2024:0618
reference_id RHSA-2024:0618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0618
37
reference_url https://access.redhat.com/errata/RHSA-2024:0619
reference_id RHSA-2024:0619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0619
38
reference_url https://access.redhat.com/errata/RHSA-2024:0622
reference_id RHSA-2024:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0622
39
reference_url https://access.redhat.com/errata/RHSA-2024:0623
reference_id RHSA-2024:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0623
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1867152
reference_id show_bug.cgi?id=1867152
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1867152
41
reference_url https://usn.ubuntu.com/6610-1/
reference_id USN-6610-1
reference_type
scores
url https://usn.ubuntu.com/6610-1/
42
reference_url https://usn.ubuntu.com/6669-1/
reference_id USN-6669-1
reference_type
scores
url https://usn.ubuntu.com/6669-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2024-0742
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xan8-8fq6-yfgd
64
url VCID-xg25-xm9t-cfb8
vulnerability_id VCID-xg25-xm9t-cfb8
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0750.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0750.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0750
reference_id
reference_type
scores
0
value 0.01479
scoring_system epss
scoring_elements 0.81022
published_at 2026-04-18T12:55:00Z
1
value 0.01479
scoring_system epss
scoring_elements 0.80957
published_at 2026-04-04T12:55:00Z
2
value 0.01479
scoring_system epss
scoring_elements 0.80989
published_at 2026-04-09T12:55:00Z
3
value 0.01479
scoring_system epss
scoring_elements 0.80982
published_at 2026-04-08T12:55:00Z
4
value 0.01479
scoring_system epss
scoring_elements 0.80955
published_at 2026-04-07T12:55:00Z
5
value 0.01479
scoring_system epss
scoring_elements 0.80935
published_at 2026-04-02T12:55:00Z
6
value 0.01479
scoring_system epss
scoring_elements 0.81021
published_at 2026-04-16T12:55:00Z
7
value 0.01479
scoring_system epss
scoring_elements 0.80984
published_at 2026-04-13T12:55:00Z
8
value 0.01479
scoring_system epss
scoring_elements 0.80992
published_at 2026-04-12T12:55:00Z
9
value 0.01479
scoring_system epss
scoring_elements 0.81006
published_at 2026-04-11T12:55:00Z
10
value 0.01525
scoring_system epss
scoring_elements 0.81318
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0750
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2259931
reference_id 2259931
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2259931
12
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
13
reference_url https://security.gentoo.org/glsa/202402-26
reference_id GLSA-202402-26
reference_type
scores
url https://security.gentoo.org/glsa/202402-26
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
reference_id mfsa2024-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-01/
reference_id mfsa2024-01
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/
url https://www.mozilla.org/security/advisories/mfsa2024-01/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-02
reference_id mfsa2024-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-02
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-02/
reference_id mfsa2024-02
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/
url https://www.mozilla.org/security/advisories/mfsa2024-02/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-04
reference_id mfsa2024-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-04
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-04/
reference_id mfsa2024-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/
url https://www.mozilla.org/security/advisories/mfsa2024-04/
20
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html
21
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html
22
reference_url https://access.redhat.com/errata/RHSA-2024:0559
reference_id RHSA-2024:0559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0559
23
reference_url https://access.redhat.com/errata/RHSA-2024:0565
reference_id RHSA-2024:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0565
24
reference_url https://access.redhat.com/errata/RHSA-2024:0596
reference_id RHSA-2024:0596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0596
25
reference_url https://access.redhat.com/errata/RHSA-2024:0598
reference_id RHSA-2024:0598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0598
26
reference_url https://access.redhat.com/errata/RHSA-2024:0600
reference_id RHSA-2024:0600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0600
27
reference_url https://access.redhat.com/errata/RHSA-2024:0601
reference_id RHSA-2024:0601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0601
28
reference_url https://access.redhat.com/errata/RHSA-2024:0602
reference_id RHSA-2024:0602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0602
29
reference_url https://access.redhat.com/errata/RHSA-2024:0603
reference_id RHSA-2024:0603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0603
30
reference_url https://access.redhat.com/errata/RHSA-2024:0604
reference_id RHSA-2024:0604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0604
31
reference_url https://access.redhat.com/errata/RHSA-2024:0605
reference_id RHSA-2024:0605
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0605
32
reference_url https://access.redhat.com/errata/RHSA-2024:0608
reference_id RHSA-2024:0608
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0608
33
reference_url https://access.redhat.com/errata/RHSA-2024:0609
reference_id RHSA-2024:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0609
34
reference_url https://access.redhat.com/errata/RHSA-2024:0615
reference_id RHSA-2024:0615
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0615
35
reference_url https://access.redhat.com/errata/RHSA-2024:0616
reference_id RHSA-2024:0616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0616
36
reference_url https://access.redhat.com/errata/RHSA-2024:0618
reference_id RHSA-2024:0618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0618
37
reference_url https://access.redhat.com/errata/RHSA-2024:0619
reference_id RHSA-2024:0619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0619
38
reference_url https://access.redhat.com/errata/RHSA-2024:0622
reference_id RHSA-2024:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0622
39
reference_url https://access.redhat.com/errata/RHSA-2024:0623
reference_id RHSA-2024:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0623
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1863083
reference_id show_bug.cgi?id=1863083
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1863083
41
reference_url https://usn.ubuntu.com/6610-1/
reference_id USN-6610-1
reference_type
scores
url https://usn.ubuntu.com/6610-1/
42
reference_url https://usn.ubuntu.com/6669-1/
reference_id USN-6669-1
reference_type
scores
url https://usn.ubuntu.com/6669-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2024-0750
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xg25-xm9t-cfb8
65
url VCID-xrg1-azru-5qf1
vulnerability_id VCID-xrg1-azru-5qf1
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4051.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4051.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4051
reference_id
reference_type
scores
0
value 0.0014
scoring_system epss
scoring_elements 0.34193
published_at 2026-04-18T12:55:00Z
1
value 0.0014
scoring_system epss
scoring_elements 0.34205
published_at 2026-04-16T12:55:00Z
2
value 0.0014
scoring_system epss
scoring_elements 0.34269
published_at 2026-04-02T12:55:00Z
3
value 0.0014
scoring_system epss
scoring_elements 0.34172
published_at 2026-04-13T12:55:00Z
4
value 0.0014
scoring_system epss
scoring_elements 0.34196
published_at 2026-04-12T12:55:00Z
5
value 0.0014
scoring_system epss
scoring_elements 0.34236
published_at 2026-04-11T12:55:00Z
6
value 0.0014
scoring_system epss
scoring_elements 0.34207
published_at 2026-04-08T12:55:00Z
7
value 0.0014
scoring_system epss
scoring_elements 0.34165
published_at 2026-04-07T12:55:00Z
8
value 0.0014
scoring_system epss
scoring_elements 0.34301
published_at 2026-04-04T12:55:00Z
9
value 0.00157
scoring_system epss
scoring_elements 0.3646
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4051
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236076
reference_id 2236076
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236076
3
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
5
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:40:45Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
reference_id mfsa2023-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
7
reference_url https://www.mozilla.org/security/advisories/mfsa2023-36/
reference_id mfsa2023-36
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:40:45Z/
url https://www.mozilla.org/security/advisories/mfsa2023-36/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
reference_id mfsa2023-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
9
reference_url https://www.mozilla.org/security/advisories/mfsa2023-38/
reference_id mfsa2023-38
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:40:45Z/
url https://www.mozilla.org/security/advisories/mfsa2023-38/
10
reference_url https://access.redhat.com/errata/RHSA-2023:4945
reference_id RHSA-2023:4945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4945
11
reference_url https://access.redhat.com/errata/RHSA-2023:4946
reference_id RHSA-2023:4946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4946
12
reference_url https://access.redhat.com/errata/RHSA-2023:4947
reference_id RHSA-2023:4947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4947
13
reference_url https://access.redhat.com/errata/RHSA-2023:4948
reference_id RHSA-2023:4948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4948
14
reference_url https://access.redhat.com/errata/RHSA-2023:4949
reference_id RHSA-2023:4949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4949
15
reference_url https://access.redhat.com/errata/RHSA-2023:4950
reference_id RHSA-2023:4950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4950
16
reference_url https://access.redhat.com/errata/RHSA-2023:4951
reference_id RHSA-2023:4951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4951
17
reference_url https://access.redhat.com/errata/RHSA-2023:4952
reference_id RHSA-2023:4952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4952
18
reference_url https://access.redhat.com/errata/RHSA-2023:4954
reference_id RHSA-2023:4954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4954
19
reference_url https://access.redhat.com/errata/RHSA-2023:4955
reference_id RHSA-2023:4955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4955
20
reference_url https://access.redhat.com/errata/RHSA-2023:4956
reference_id RHSA-2023:4956
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4956
21
reference_url https://access.redhat.com/errata/RHSA-2023:4957
reference_id RHSA-2023:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4957
22
reference_url https://access.redhat.com/errata/RHSA-2023:4958
reference_id RHSA-2023:4958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4958
23
reference_url https://access.redhat.com/errata/RHSA-2023:4959
reference_id RHSA-2023:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4959
24
reference_url https://access.redhat.com/errata/RHSA-2023:5019
reference_id RHSA-2023:5019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5019
25
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1821884
reference_id show_bug.cgi?id=1821884
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:40:45Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1821884
26
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4051
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xrg1-azru-5qf1
66
url VCID-y8xv-ss2c-4bhk
vulnerability_id VCID-y8xv-ss2c-4bhk
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0753.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0753.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0753
reference_id
reference_type
scores
0
value 0.00327
scoring_system epss
scoring_elements 0.55659
published_at 2026-04-21T12:55:00Z
1
value 0.00355
scoring_system epss
scoring_elements 0.5784
published_at 2026-04-08T12:55:00Z
2
value 0.00355
scoring_system epss
scoring_elements 0.57815
published_at 2026-04-13T12:55:00Z
3
value 0.00355
scoring_system epss
scoring_elements 0.57837
published_at 2026-04-12T12:55:00Z
4
value 0.00355
scoring_system epss
scoring_elements 0.57858
published_at 2026-04-11T12:55:00Z
5
value 0.00355
scoring_system epss
scoring_elements 0.57842
published_at 2026-04-09T12:55:00Z
6
value 0.00355
scoring_system epss
scoring_elements 0.57791
published_at 2026-04-02T12:55:00Z
7
value 0.00355
scoring_system epss
scoring_elements 0.57811
published_at 2026-04-04T12:55:00Z
8
value 0.00355
scoring_system epss
scoring_elements 0.57785
published_at 2026-04-07T12:55:00Z
9
value 0.00355
scoring_system epss
scoring_elements 0.57843
published_at 2026-04-18T12:55:00Z
10
value 0.00355
scoring_system epss
scoring_elements 0.57844
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0753
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2259933
reference_id 2259933
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2259933
12
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
13
reference_url https://security.gentoo.org/glsa/202402-26
reference_id GLSA-202402-26
reference_type
scores
url https://security.gentoo.org/glsa/202402-26
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
reference_id mfsa2024-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-01
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-01/
reference_id mfsa2024-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/
url https://www.mozilla.org/security/advisories/mfsa2024-01/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-02
reference_id mfsa2024-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-02
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-02/
reference_id mfsa2024-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/
url https://www.mozilla.org/security/advisories/mfsa2024-02/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-04
reference_id mfsa2024-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-04
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-04/
reference_id mfsa2024-04
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/
url https://www.mozilla.org/security/advisories/mfsa2024-04/
20
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html
21
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html
22
reference_url https://access.redhat.com/errata/RHSA-2024:0559
reference_id RHSA-2024:0559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0559
23
reference_url https://access.redhat.com/errata/RHSA-2024:0565
reference_id RHSA-2024:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0565
24
reference_url https://access.redhat.com/errata/RHSA-2024:0596
reference_id RHSA-2024:0596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0596
25
reference_url https://access.redhat.com/errata/RHSA-2024:0598
reference_id RHSA-2024:0598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0598
26
reference_url https://access.redhat.com/errata/RHSA-2024:0600
reference_id RHSA-2024:0600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0600
27
reference_url https://access.redhat.com/errata/RHSA-2024:0601
reference_id RHSA-2024:0601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0601
28
reference_url https://access.redhat.com/errata/RHSA-2024:0602
reference_id RHSA-2024:0602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0602
29
reference_url https://access.redhat.com/errata/RHSA-2024:0603
reference_id RHSA-2024:0603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0603
30
reference_url https://access.redhat.com/errata/RHSA-2024:0604
reference_id RHSA-2024:0604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0604
31
reference_url https://access.redhat.com/errata/RHSA-2024:0605
reference_id RHSA-2024:0605
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0605
32
reference_url https://access.redhat.com/errata/RHSA-2024:0608
reference_id RHSA-2024:0608
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0608
33
reference_url https://access.redhat.com/errata/RHSA-2024:0609
reference_id RHSA-2024:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0609
34
reference_url https://access.redhat.com/errata/RHSA-2024:0615
reference_id RHSA-2024:0615
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0615
35
reference_url https://access.redhat.com/errata/RHSA-2024:0616
reference_id RHSA-2024:0616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0616
36
reference_url https://access.redhat.com/errata/RHSA-2024:0618
reference_id RHSA-2024:0618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0618
37
reference_url https://access.redhat.com/errata/RHSA-2024:0619
reference_id RHSA-2024:0619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0619
38
reference_url https://access.redhat.com/errata/RHSA-2024:0622
reference_id RHSA-2024:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0622
39
reference_url https://access.redhat.com/errata/RHSA-2024:0623
reference_id RHSA-2024:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0623
40
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1870262
reference_id show_bug.cgi?id=1870262
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1870262
41
reference_url https://usn.ubuntu.com/6610-1/
reference_id USN-6610-1
reference_type
scores
url https://usn.ubuntu.com/6610-1/
42
reference_url https://usn.ubuntu.com/6669-1/
reference_id USN-6669-1
reference_type
scores
url https://usn.ubuntu.com/6669-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2024-0753
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y8xv-ss2c-4bhk
67
url VCID-yd2q-assr-v3er
vulnerability_id VCID-yd2q-assr-v3er
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6212.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6212.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6212
reference_id
reference_type
scores
0
value 0.00389
scoring_system epss
scoring_elements 0.60007
published_at 2026-04-21T12:55:00Z
1
value 0.00389
scoring_system epss
scoring_elements 0.60021
published_at 2026-04-18T12:55:00Z
2
value 0.00389
scoring_system epss
scoring_elements 0.59929
published_at 2026-04-02T12:55:00Z
3
value 0.00389
scoring_system epss
scoring_elements 0.59924
published_at 2026-04-07T12:55:00Z
4
value 0.00389
scoring_system epss
scoring_elements 0.59954
published_at 2026-04-04T12:55:00Z
5
value 0.00389
scoring_system epss
scoring_elements 0.59974
published_at 2026-04-08T12:55:00Z
6
value 0.00389
scoring_system epss
scoring_elements 0.60014
published_at 2026-04-16T12:55:00Z
7
value 0.00389
scoring_system epss
scoring_elements 0.59975
published_at 2026-04-13T12:55:00Z
8
value 0.00389
scoring_system epss
scoring_elements 0.59994
published_at 2026-04-12T12:55:00Z
9
value 0.00389
scoring_system epss
scoring_elements 0.60009
published_at 2026-04-11T12:55:00Z
10
value 0.00389
scoring_system epss
scoring_elements 0.59988
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6212
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2250902
reference_id 2250902
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2250902
10
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1658432%2C1820983%2C1829252%2C1856072%2C1856091%2C1859030%2C1860943%2C1862782
reference_id buglist.cgi?bug_id=1658432%2C1820983%2C1829252%2C1856072%2C1856091%2C1859030%2C1860943%2C1862782
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1658432%2C1820983%2C1829252%2C1856072%2C1856091%2C1859030%2C1860943%2C1862782
11
reference_url https://www.debian.org/security/2023/dsa-5561
reference_id dsa-5561
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/
url https://www.debian.org/security/2023/dsa-5561
12
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
reference_id mfsa2023-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-49/
reference_id mfsa2023-49
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/
url https://www.mozilla.org/security/advisories/mfsa2023-49/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-50
reference_id mfsa2023-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-50
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-50/
reference_id mfsa2023-50
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/
url https://www.mozilla.org/security/advisories/mfsa2023-50/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-52
reference_id mfsa2023-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-52
18
reference_url https://www.mozilla.org/security/advisories/mfsa2023-52/
reference_id mfsa2023-52
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/
url https://www.mozilla.org/security/advisories/mfsa2023-52/
19
reference_url https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/
url https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html
20
reference_url https://lists.debian.org/debian-lts-announce/2023/11/msg00030.html
reference_id msg00030.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/
url https://lists.debian.org/debian-lts-announce/2023/11/msg00030.html
21
reference_url https://access.redhat.com/errata/RHSA-2023:7499
reference_id RHSA-2023:7499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7499
22
reference_url https://access.redhat.com/errata/RHSA-2023:7500
reference_id RHSA-2023:7500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7500
23
reference_url https://access.redhat.com/errata/RHSA-2023:7501
reference_id RHSA-2023:7501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7501
24
reference_url https://access.redhat.com/errata/RHSA-2023:7502
reference_id RHSA-2023:7502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7502
25
reference_url https://access.redhat.com/errata/RHSA-2023:7503
reference_id RHSA-2023:7503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7503
26
reference_url https://access.redhat.com/errata/RHSA-2023:7504
reference_id RHSA-2023:7504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7504
27
reference_url https://access.redhat.com/errata/RHSA-2023:7505
reference_id RHSA-2023:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7505
28
reference_url https://access.redhat.com/errata/RHSA-2023:7506
reference_id RHSA-2023:7506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7506
29
reference_url https://access.redhat.com/errata/RHSA-2023:7507
reference_id RHSA-2023:7507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7507
30
reference_url https://access.redhat.com/errata/RHSA-2023:7508
reference_id RHSA-2023:7508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7508
31
reference_url https://access.redhat.com/errata/RHSA-2023:7509
reference_id RHSA-2023:7509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7509
32
reference_url https://access.redhat.com/errata/RHSA-2023:7510
reference_id RHSA-2023:7510
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7510
33
reference_url https://access.redhat.com/errata/RHSA-2023:7511
reference_id RHSA-2023:7511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7511
34
reference_url https://access.redhat.com/errata/RHSA-2023:7512
reference_id RHSA-2023:7512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7512
35
reference_url https://access.redhat.com/errata/RHSA-2023:7547
reference_id RHSA-2023:7547
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7547
36
reference_url https://access.redhat.com/errata/RHSA-2023:7569
reference_id RHSA-2023:7569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7569
37
reference_url https://access.redhat.com/errata/RHSA-2023:7570
reference_id RHSA-2023:7570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7570
38
reference_url https://access.redhat.com/errata/RHSA-2023:7573
reference_id RHSA-2023:7573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7573
39
reference_url https://access.redhat.com/errata/RHSA-2023:7574
reference_id RHSA-2023:7574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7574
40
reference_url https://access.redhat.com/errata/RHSA-2023:7577
reference_id RHSA-2023:7577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7577
41
reference_url https://usn.ubuntu.com/6509-1/
reference_id USN-6509-1
reference_type
scores
url https://usn.ubuntu.com/6509-1/
42
reference_url https://usn.ubuntu.com/6515-1/
reference_id USN-6515-1
reference_type
scores
url https://usn.ubuntu.com/6515-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-6212
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yd2q-assr-v3er
68
url VCID-ygrd-4scr-wkau
vulnerability_id VCID-ygrd-4scr-wkau
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4053.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4053.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4053
reference_id
reference_type
scores
0
value 0.00145
scoring_system epss
scoring_elements 0.34805
published_at 2026-04-21T12:55:00Z
1
value 0.00145
scoring_system epss
scoring_elements 0.34855
published_at 2026-04-08T12:55:00Z
2
value 0.00145
scoring_system epss
scoring_elements 0.34884
published_at 2026-04-09T12:55:00Z
3
value 0.00145
scoring_system epss
scoring_elements 0.34887
published_at 2026-04-11T12:55:00Z
4
value 0.00145
scoring_system epss
scoring_elements 0.3485
published_at 2026-04-12T12:55:00Z
5
value 0.00145
scoring_system epss
scoring_elements 0.34826
published_at 2026-04-13T12:55:00Z
6
value 0.00145
scoring_system epss
scoring_elements 0.34865
published_at 2026-04-16T12:55:00Z
7
value 0.00145
scoring_system epss
scoring_elements 0.34849
published_at 2026-04-18T12:55:00Z
8
value 0.00145
scoring_system epss
scoring_elements 0.34904
published_at 2026-04-02T12:55:00Z
9
value 0.00145
scoring_system epss
scoring_elements 0.34931
published_at 2026-04-04T12:55:00Z
10
value 0.00145
scoring_system epss
scoring_elements 0.3481
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4053
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236078
reference_id 2236078
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236078
3
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
reference_id mfsa2023-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-29
5
reference_url https://www.mozilla.org/security/advisories/mfsa2023-29/
reference_id mfsa2023-29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:53Z/
url https://www.mozilla.org/security/advisories/mfsa2023-29/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
reference_id mfsa2023-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-36
7
reference_url https://www.mozilla.org/security/advisories/mfsa2023-36/
reference_id mfsa2023-36
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:53Z/
url https://www.mozilla.org/security/advisories/mfsa2023-36/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
reference_id mfsa2023-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-38
9
reference_url https://www.mozilla.org/security/advisories/mfsa2023-38/
reference_id mfsa2023-38
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:53Z/
url https://www.mozilla.org/security/advisories/mfsa2023-38/
10
reference_url https://access.redhat.com/errata/RHSA-2023:4945
reference_id RHSA-2023:4945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4945
11
reference_url https://access.redhat.com/errata/RHSA-2023:4946
reference_id RHSA-2023:4946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4946
12
reference_url https://access.redhat.com/errata/RHSA-2023:4947
reference_id RHSA-2023:4947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4947
13
reference_url https://access.redhat.com/errata/RHSA-2023:4948
reference_id RHSA-2023:4948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4948
14
reference_url https://access.redhat.com/errata/RHSA-2023:4949
reference_id RHSA-2023:4949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4949
15
reference_url https://access.redhat.com/errata/RHSA-2023:4950
reference_id RHSA-2023:4950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4950
16
reference_url https://access.redhat.com/errata/RHSA-2023:4951
reference_id RHSA-2023:4951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4951
17
reference_url https://access.redhat.com/errata/RHSA-2023:4952
reference_id RHSA-2023:4952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4952
18
reference_url https://access.redhat.com/errata/RHSA-2023:4954
reference_id RHSA-2023:4954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4954
19
reference_url https://access.redhat.com/errata/RHSA-2023:4955
reference_id RHSA-2023:4955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4955
20
reference_url https://access.redhat.com/errata/RHSA-2023:4956
reference_id RHSA-2023:4956
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4956
21
reference_url https://access.redhat.com/errata/RHSA-2023:4957
reference_id RHSA-2023:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4957
22
reference_url https://access.redhat.com/errata/RHSA-2023:4958
reference_id RHSA-2023:4958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4958
23
reference_url https://access.redhat.com/errata/RHSA-2023:4959
reference_id RHSA-2023:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4959
24
reference_url https://access.redhat.com/errata/RHSA-2023:5019
reference_id RHSA-2023:5019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5019
25
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1839079
reference_id show_bug.cgi?id=1839079
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:53Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1839079
26
reference_url https://usn.ubuntu.com/6267-1/
reference_id USN-6267-1
reference_type
scores
url https://usn.ubuntu.com/6267-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-4053
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ygrd-4scr-wkau
69
url VCID-zhu4-sy56-1yea
vulnerability_id VCID-zhu4-sy56-1yea
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6861.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6861.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6861
reference_id
reference_type
scores
0
value 0.00415
scoring_system epss
scoring_elements 0.6171
published_at 2026-04-18T12:55:00Z
1
value 0.00415
scoring_system epss
scoring_elements 0.61704
published_at 2026-04-16T12:55:00Z
2
value 0.00415
scoring_system epss
scoring_elements 0.61609
published_at 2026-04-07T12:55:00Z
3
value 0.00415
scoring_system epss
scoring_elements 0.61639
published_at 2026-04-04T12:55:00Z
4
value 0.00415
scoring_system epss
scoring_elements 0.61658
published_at 2026-04-08T12:55:00Z
5
value 0.00415
scoring_system epss
scoring_elements 0.61672
published_at 2026-04-09T12:55:00Z
6
value 0.00415
scoring_system epss
scoring_elements 0.61694
published_at 2026-04-11T12:55:00Z
7
value 0.00415
scoring_system epss
scoring_elements 0.61663
published_at 2026-04-13T12:55:00Z
8
value 0.00415
scoring_system epss
scoring_elements 0.61682
published_at 2026-04-12T12:55:00Z
9
value 0.00499
scoring_system epss
scoring_elements 0.65975
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6861
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255367
reference_id 2255367
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255367
17
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
reference_id mfsa2023-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-54
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
reference_id mfsa2023-55
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-55
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
reference_id mfsa2023-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-56
21
reference_url https://access.redhat.com/errata/RHSA-2024:0001
reference_id RHSA-2024:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0001
22
reference_url https://access.redhat.com/errata/RHSA-2024:0002
reference_id RHSA-2024:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0002
23
reference_url https://access.redhat.com/errata/RHSA-2024:0003
reference_id RHSA-2024:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0003
24
reference_url https://access.redhat.com/errata/RHSA-2024:0004
reference_id RHSA-2024:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0004
25
reference_url https://access.redhat.com/errata/RHSA-2024:0005
reference_id RHSA-2024:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0005
26
reference_url https://access.redhat.com/errata/RHSA-2024:0011
reference_id RHSA-2024:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0011
27
reference_url https://access.redhat.com/errata/RHSA-2024:0012
reference_id RHSA-2024:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0012
28
reference_url https://access.redhat.com/errata/RHSA-2024:0019
reference_id RHSA-2024:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0019
29
reference_url https://access.redhat.com/errata/RHSA-2024:0021
reference_id RHSA-2024:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0021
30
reference_url https://access.redhat.com/errata/RHSA-2024:0022
reference_id RHSA-2024:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0022
31
reference_url https://access.redhat.com/errata/RHSA-2024:0023
reference_id RHSA-2024:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0023
32
reference_url https://access.redhat.com/errata/RHSA-2024:0024
reference_id RHSA-2024:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0024
33
reference_url https://access.redhat.com/errata/RHSA-2024:0025
reference_id RHSA-2024:0025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0025
34
reference_url https://access.redhat.com/errata/RHSA-2024:0026
reference_id RHSA-2024:0026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0026
35
reference_url https://access.redhat.com/errata/RHSA-2024:0027
reference_id RHSA-2024:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0027
36
reference_url https://access.redhat.com/errata/RHSA-2024:0028
reference_id RHSA-2024:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0028
37
reference_url https://access.redhat.com/errata/RHSA-2024:0029
reference_id RHSA-2024:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0029
38
reference_url https://access.redhat.com/errata/RHSA-2024:0030
reference_id RHSA-2024:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0030
39
reference_url https://usn.ubuntu.com/6562-1/
reference_id USN-6562-1
reference_type
scores
url https://usn.ubuntu.com/6562-1/
40
reference_url https://usn.ubuntu.com/6563-1/
reference_id USN-6563-1
reference_type
scores
url https://usn.ubuntu.com/6563-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-6861
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zhu4-sy56-1yea
70
url VCID-zjn8-79ab-tqd3
vulnerability_id VCID-zjn8-79ab-tqd3
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5726.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5726.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5726
reference_id
reference_type
scores
0
value 0.00173
scoring_system epss
scoring_elements 0.38657
published_at 2026-04-21T12:55:00Z
1
value 0.00173
scoring_system epss
scoring_elements 0.38703
published_at 2026-04-07T12:55:00Z
2
value 0.00173
scoring_system epss
scoring_elements 0.38753
published_at 2026-04-08T12:55:00Z
3
value 0.00173
scoring_system epss
scoring_elements 0.38764
published_at 2026-04-09T12:55:00Z
4
value 0.00173
scoring_system epss
scoring_elements 0.38776
published_at 2026-04-11T12:55:00Z
5
value 0.00173
scoring_system epss
scoring_elements 0.38739
published_at 2026-04-12T12:55:00Z
6
value 0.00173
scoring_system epss
scoring_elements 0.38712
published_at 2026-04-13T12:55:00Z
7
value 0.00173
scoring_system epss
scoring_elements 0.38758
published_at 2026-04-16T12:55:00Z
8
value 0.00173
scoring_system epss
scoring_elements 0.38736
published_at 2026-04-18T12:55:00Z
9
value 0.00173
scoring_system epss
scoring_elements 0.38752
published_at 2026-04-02T12:55:00Z
10
value 0.00173
scoring_system epss
scoring_elements 0.38774
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5726
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245901
reference_id 2245901
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245901
4
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-45
reference_id mfsa2023-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-45
6
reference_url https://www.mozilla.org/security/advisories/mfsa2023-45/
reference_id mfsa2023-45
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:53:41Z/
url https://www.mozilla.org/security/advisories/mfsa2023-45/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-46
reference_id mfsa2023-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2023-46/
reference_id mfsa2023-46
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:53:41Z/
url https://www.mozilla.org/security/advisories/mfsa2023-46/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-47
reference_id mfsa2023-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-47
10
reference_url https://www.mozilla.org/security/advisories/mfsa2023-47/
reference_id mfsa2023-47
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:53:41Z/
url https://www.mozilla.org/security/advisories/mfsa2023-47/
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1846205
reference_id show_bug.cgi?id=1846205
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:53:41Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1846205
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-5726
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zjn8-79ab-tqd3
71
url VCID-zqpe-9hvc-vkbp
vulnerability_id VCID-zqpe-9hvc-vkbp
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5725.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5725.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5725
reference_id
reference_type
scores
0
value 0.00313
scoring_system epss
scoring_elements 0.54465
published_at 2026-04-21T12:55:00Z
1
value 0.00415
scoring_system epss
scoring_elements 0.61625
published_at 2026-04-04T12:55:00Z
2
value 0.00415
scoring_system epss
scoring_elements 0.61695
published_at 2026-04-18T12:55:00Z
3
value 0.00415
scoring_system epss
scoring_elements 0.61659
published_at 2026-04-09T12:55:00Z
4
value 0.00415
scoring_system epss
scoring_elements 0.61644
published_at 2026-04-08T12:55:00Z
5
value 0.00415
scoring_system epss
scoring_elements 0.61596
published_at 2026-04-07T12:55:00Z
6
value 0.00415
scoring_system epss
scoring_elements 0.61691
published_at 2026-04-16T12:55:00Z
7
value 0.00415
scoring_system epss
scoring_elements 0.61649
published_at 2026-04-13T12:55:00Z
8
value 0.00415
scoring_system epss
scoring_elements 0.61669
published_at 2026-04-12T12:55:00Z
9
value 0.00415
scoring_system epss
scoring_elements 0.6168
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5725
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245900
reference_id 2245900
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245900
10
reference_url https://www.debian.org/security/2023/dsa-5535
reference_id dsa-5535
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/
url https://www.debian.org/security/2023/dsa-5535
11
reference_url https://www.debian.org/security/2023/dsa-5538
reference_id dsa-5538
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/
url https://www.debian.org/security/2023/dsa-5538
12
reference_url https://security.gentoo.org/glsa/202402-25
reference_id GLSA-202402-25
reference_type
scores
url https://security.gentoo.org/glsa/202402-25
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-45
reference_id mfsa2023-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-45
14
reference_url https://www.mozilla.org/security/advisories/mfsa2023-45/
reference_id mfsa2023-45
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/
url https://www.mozilla.org/security/advisories/mfsa2023-45/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-46
reference_id mfsa2023-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-46
16
reference_url https://www.mozilla.org/security/advisories/mfsa2023-46/
reference_id mfsa2023-46
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/
url https://www.mozilla.org/security/advisories/mfsa2023-46/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-47
reference_id mfsa2023-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-47
18
reference_url https://www.mozilla.org/security/advisories/mfsa2023-47/
reference_id mfsa2023-47
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/
url https://www.mozilla.org/security/advisories/mfsa2023-47/
19
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html
reference_id msg00037.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html
20
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html
reference_id msg00042.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html
21
reference_url https://access.redhat.com/errata/RHSA-2023:6162
reference_id RHSA-2023:6162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6162
22
reference_url https://access.redhat.com/errata/RHSA-2023:6185
reference_id RHSA-2023:6185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6185
23
reference_url https://access.redhat.com/errata/RHSA-2023:6186
reference_id RHSA-2023:6186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6186
24
reference_url https://access.redhat.com/errata/RHSA-2023:6187
reference_id RHSA-2023:6187
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6187
25
reference_url https://access.redhat.com/errata/RHSA-2023:6188
reference_id RHSA-2023:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6188
26
reference_url https://access.redhat.com/errata/RHSA-2023:6189
reference_id RHSA-2023:6189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6189
27
reference_url https://access.redhat.com/errata/RHSA-2023:6191
reference_id RHSA-2023:6191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6191
28
reference_url https://access.redhat.com/errata/RHSA-2023:6194
reference_id RHSA-2023:6194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6194
29
reference_url https://access.redhat.com/errata/RHSA-2023:6195
reference_id RHSA-2023:6195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6195
30
reference_url https://access.redhat.com/errata/RHSA-2023:6196
reference_id RHSA-2023:6196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6196
31
reference_url https://access.redhat.com/errata/RHSA-2023:6197
reference_id RHSA-2023:6197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6197
32
reference_url https://access.redhat.com/errata/RHSA-2023:6198
reference_id RHSA-2023:6198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6198
33
reference_url https://access.redhat.com/errata/RHSA-2023:6199
reference_id RHSA-2023:6199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6199
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1845739
reference_id show_bug.cgi?id=1845739
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1845739
35
reference_url https://usn.ubuntu.com/6456-1/
reference_id USN-6456-1
reference_type
scores
url https://usn.ubuntu.com/6456-1/
36
reference_url https://usn.ubuntu.com/6468-1/
reference_id USN-6468-1
reference_type
scores
url https://usn.ubuntu.com/6468-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@115.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@115.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0
aliases CVE-2023-5725
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zqpe-9hvc-vkbp
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0